Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

The threat group TeamPCP injected credential-stealing malware into LiteLLM PyPI versions 1.82.7 and 1.82.8, exposing an estimated 500,000 devices and cascading into downstream tools including Aqua Security Trivy, Aqua Security Docker images, and Checkmarx KICS; the campaign also targets VS Code extensions and GitHub Actions in an ongoing multi-vector supply chain operation. The malware targets AWS, GCP, and Azure credentials, SSH keys, Kubernetes secrets, and cryptocurrency wallets, with persistence via hidden systemd services. Organizations should immediately remove affected LiteLLM versions, rotate all cloud credentials and secrets accessible from exposed environments, audit CI/CD pipeline logs and container images for affected package presence, and implement cryptographic integrity verification for all PyPI dependencies.

Author

claude-agent