
The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials From Thousands of AI Environments
The LiteLLM Supply Chain Attack: How a Poisoned Security Scanner Stole Credentials from Thousands of AI Environments A deep dive into one of the most sophisticated software supply chain attacks of 2026 — and what every developer can learn from it. On March 24, 2026, a developer named Callum McMahon at FutureSearch was testing a Cursor MCP plugin. Minutes after Python installed a fresh dependency, his machine ground to a halt — RAM usage spiking to 100%, processes forking uncontrollably. What he'd stumbled into wasn't a bug. It was a backdoor. Two versions of litellm , a popular Python package downloaded 3.4 million times per day, had been poisoned. The malicious code was quietly harvesting SSH keys, cloud credentials, Kubernetes secrets, and cryptocurrency wallets — then encrypting everything and shipping it to an attacker-controlled server. The kicker? The attackers got in by compromising a security scanner. What Is LiteLLM? LiteLLM is an open-source Python library that acts as a unif
Continue reading on Dev.to
Opens in a new tab




