You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Proxy Docker image users were not impacted, all dependencies are pinned on requirements.txt
No litellm releases will be out until we have scanned our chain and make sure it's safe
Next Steps
Review all berriai repo's for impact
Scan circle ci builds to understand blast radius, and mitigate it
We've engaged Google's mandiant.security team, and are actively working on this with them
We are actively investigating this issue. Please reach out to us on support@berri.ai, if you have any questions / concerns.
Summary
The litellm PyPI package was compromised by an attacker who gained access to the maintainer's PyPI account. Malicious versions were published that steal credentials and exfiltrate them to an attacker-controlled server.
Encrypts: AES-256-CBC + RSA-4096 (hardcoded public key)
Exfiltrates: curl POST to https://models.litellm.cloud/
The exfiltration domain litellm.cloud (NOT the official litellm.ai) was registered on 2026-03-23 via Spaceship, Inc. — just hours before the malicious packages appeared.
Current status
PyPI: The entire litellm package has been suspended/removed. All versions currently return "No matching distribution found." We reported the malware to PyPI via the official "Report malware" form.
Attacker behavior: The attacker appears to be publishing hundreds of spam comments to suppress discussion. If this continues, we recommend moderating via the Hacker News thread linked above.
Recommendations for affected users
Check if litellm_init.pth exists in your site-packages/ directory
Rotate ALL credentials that were present as environment variables or config files on any system where litellm 1.82.7+ was installed
Pin dependencies to exact versions and verify against GitHub releases
Monitor for unauthorized access using any potentially leaked credentials
[LITELLM TEAM UPDATES]
Next Steps
We are actively investigating this issue. Please reach out to us on support@berri.ai, if you have any questions / concerns.
Summary
The litellm PyPI package was compromised by an attacker who gained access to the maintainer's PyPI account. Malicious versions were published that steal credentials and exfiltrate them to an attacker-controlled server.
Original detailed analysis: #24512
Hacker News discussion: https://news.ycombinator.com/item?id=47501729
What happened
krrishdholakia) appears to have been hijacked by an attacker (teampcp)v1.82.6.dev1— versions 1.82.7 and 1.82.8 on PyPI were uploaded directly by the attackerAffected versions
litellm/proxy/proxy_server.pyimport litellm.proxylitellm_init.pth(34,628 bytes) + payload inproxy_server.pyOther versions may also be affected and should be audited.
What the malicious code does
curl POSTtohttps://models.litellm.cloud/The exfiltration domain
litellm.cloud(NOT the officiallitellm.ai) was registered on 2026-03-23 via Spaceship, Inc. — just hours before the malicious packages appeared.Current status
Recommendations for affected users
litellm_init.pthexists in yoursite-packages/directoryReferences
litellm_init.pthSHA256:ceNa7wMJnNHy1kRnNCcwJaFjWX3pORLfMh7xGL8TUjg