EmergingSafety

Mercor $10B Data Breach via LiteLLM Supply Chain Attack

Why It Matters

This incident highlights the catastrophic vulnerability of AI supply chains and the permanent risk of biometric data theft in the industry.

Key Points

  • Hackers compromised Aqua Security's Trivy scanner to hijack the LiteLLM open-source proxy project.
  • A malicious version of LiteLLM (v1.82.8) was uploaded to PyPI, using a .pth file to auto-execute malware upon Python startup.
  • Mercor lost 4TB of data, including 3TB of biometric video interviews and KYC documents used for identity verification.
  • The breach is linked to developers using an AI coding assistant (Claude) with unrestricted system permissions.
  • The stolen data is currently being auctioned by the Lapsus$ hacking group, posing a permanent identity theft risk.

Mercor, an AI talent platform valued at $10 billion, has suffered a massive data breach affecting 4TB of sensitive data, including biometric face and voice recordings. The breach originated from a sophisticated supply chain attack targeting the popular open-source project LiteLLM. Attackers from the group TeamPCP initially compromised the Trivy security scanner by Aqua Security to gain credentials, which were then used to upload a malicious version of LiteLLM (v1.82.8) to PyPI. The malware utilized a hidden .pth file to execute code immediately upon Python startup, harvesting SSH keys and cloud tokens. Reports suggest Mercor developers inadvertently facilitated the breach by providing production credentials to an AI coding assistant running with elevated permissions. The stolen data, which includes source code and identity verification documents for 30,000+ contractors, is currently being auctioned by the Lapsus$ hacking group.

Imagine a $10 billion tech giant getting hacked not because of a bad password, but because a tiny tool they didn't even know they were using was 'poisoned'. A group of hackers broke into a security scanner, used it to sneak malware into a popular AI library called LiteLLM, and then waited for it to spread. At Mercor, developers were using an AI chatbot with too much power, which accidentally let the malware in. The hackers walked away with 4TB of data, including videos of people's faces and voices. Since you can't change your face like a password, these people's identities are now at permanent risk.

Sides

Critics

TeamPCPC

The threat actor responsible for the initial compromise of the Trivy security scanner and the poisoning of LiteLLM.

Lapsus$C

The hacking group currently auctioning the stolen 4TB of Mercor data on the dark web.

Defenders

No defenders identified

Neutral

MercorC

The victimized AI startup currently facing a massive data exfiltration crisis and potential legal liabilities.

Aqua SecurityC

The provider of the Trivy scanner which served as the initial entry point for the attack chain.

LiteLLM MaintainersC

The open-source developers whose project was hijacked to distribute malware via PyPI.

Join the Discussion

Community discussions coming soon. Stay tuned →

Be the first to share your perspective. Subscribe to comment.

Noise Level

Buzz50
Decay: 100%
Reach
45
Engagement
77
Star Power
25
Duration
6
Cross-Platform
20
Polarity
85
Industry Impact
95

Forecast

AI Analysis — Possible Scenarios

Regulatory bodies are likely to mandate stricter 'Software Bill of Materials' (SBOM) requirements for AI companies to track deep dependencies. We can also expect a shift toward 'air-gapped' or highly restricted environments for AI coding assistants to prevent them from accessing production secrets.

Based on current signals. Events may develop differently.

Timeline

Today

@aakashgupta

A $10 billion AI startup just got gutted because a security scanner was the entry point.. and their own developers reportedly handed production credentials to an AI chatbot. Mercor trains AI models for OpenAI, Anthropic, and Google DeepMind. They manage 30,000+ contractors, proce…

Timeline

  1. Lapsus$ Auction Begins

    The hacking group lists the stolen Mercor database, source code, and biometric files for sale.

  2. Mercor Data Exfiltration

    Malware leverages developer AI assistant permissions to exfiltrate 4TB of data to a spoofed domain.

  3. LiteLLM Poisoned on PyPI

    Version 1.82.8 of LiteLLM is uploaded with a malicious .pth payload that harvests credentials.

  4. Trivy Scanner Compromised

    TeamPCP gains access to credentials through Aqua Security's Trivy tool.