The threat group TeamPCP injected credential-stealing malware into LiteLLM PyPI versions 1.82.7 and 1.82.8, exposing an estimated 500,000 devices and cascading into downstream tools including Aqua Security Trivy, Aqua Security Docker images, and Checkmarx KICS; the campaign also targets VS Code extensions and GitHub Actions in an ongoing multi-vector supply chain operation. The malware targets AWS, GCP, and Azure credentials, SSH keys, Kubernetes secrets, and cryptocurrency wallets, with persistence via hidden systemd services. Organizations should immediately remove affected LiteLLM versions, rotate all cloud credentials and secrets accessible from exposed environments, audit CI/CD pipeline logs and container images for affected package presence, and implement cryptographic integrity verification for all PyPI dependencies.