LiteLLM query hacked

A critical and malicious hack was found in LLM query. LiteLLM is used be a variety of tools that interact with chatgpt, claude etc.

The hack harvests env vars, SSH keys, cloud credentials, Kubernetes secrets, Docker configs, shell history, DB credentials, wallet files, and CI/CD secrets → encrypts with AES-256 + RSA-4096 → exfiltrates to models.litellm[.]cloud → installs a persistent sysmon.service systemd backdoor that polls checkmarx[.]zone for follow-on payloads.

Tools affected: CrewAI, OpenHands, Browser-Use, Agno, Camel-AI, Nanobot, DSPy, MLflow, Mem0, Instructor, Guardrails, Microsoft GraphRAG, Google ADK, Cursor IDE, Opik, Harbor​​​​​​​​​​​​​​​​. Possibly also openclaw.

Link to llm github:

2 Likes

This is terrible, the sophistication and propagation of this attack is staggering. If I understood well the attack happens when the user installs a Python package, even before running it.

Which brings the question if macOS users would be more protected given the different levels of sandboxing we have… and while probably receiving a permissions notification during the installation of a Python package is suspicious enough to make a lot of users aware of something evil going on, a lot of other users would simply click and accept simply because they have “notification fatigue”.

5 Likes

When you pip install a package, it writes into the Python site-packages directory — that’s a normal, unprivileged user-space operation requiring no elevated permissions whatsoever. Sandboxing protects against privilege escalation and cross-process boundary violations, but it has nothing to say about what happens within your own user space.

The malicious .pth file sits in site-packages and Python’s own startup machinery executes it automatically on every Python invocation — no import, no explicit call, nothing for a sandbox to intercept. It’s the Python runtime itself doing the execution, behaving entirely as designed.

So macOS is mostly affected as much as Linux and MS

3 Likes