Diamond Member ThaHaka 0 Posted March 24 Diamond Member Share Posted March 24 This is the hidden content, please Sign In or Sign Up TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent *********. Multiple security vendors, including Endor Labs and JFrog, revealed that litellm versions 1.82.7 and 1.82.8 were published on This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/306206-h4ckn3wsteampcp-backdoors-litellm-versions-1827%E2%80%931828-likely-via-trivy-cicd-compromise/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.