Version 1.82.8 of the LiteLLM Python package on PyPI contained a malicious .pth file that automatically executed a credential-stealing script upon Python interpreter startup, collecting SSH keys, cloud credentials, API tokens, and other secrets before exfiltrating them to an attacker-controlled server. PyPI was urged to remove the compromised version immediately while users were advised to rotate all credentials on systems where the package was installed.
1 comment
Version 1.82.8 of the LiteLLM Python package on PyPI contained a malicious .pth file that automatically executed a credential-stealing script upon Python interpreter startup, collecting SSH keys, cloud credentials, API tokens, and other secrets before exfiltrating them to an attacker-controlled server. PyPI was urged to remove the compromised version immediately while users were advised to rotate all credentials on systems where the package was installed.