Mercor Breach Exposes TeamPCP's LiteLLM Rampage in Real Time
Mercor just admitted it: TeamPCP's LiteLLM poison pill hit hard. Wiz peels back the post-breach playbook, showing how attackers feast on cloud creds.
⚡ Key Takeaways
- Mercor confirms first official TeamPCP victim via LiteLLM creds, exposing 4TB data.
- Wiz reveals TeamPCP's 24-hour cloud enum playbook: IAM, EC2, S3 focus with bold naming.
- Rotate creds now—supply chain credential theft is active, not theoretical.
🧠 What's your take on this?
Cast your vote and see what Threat Digest readers think
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by SANS Internet Storm Center