📋 Compliance & Policy

Mercor Breach Exposes TeamPCP's LiteLLM Rampage in Real Time

Mercor just admitted it: TeamPCP's LiteLLM poison pill hit hard. Wiz peels back the post-breach playbook, showing how attackers feast on cloud creds.

Visualization of TeamPCP supply chain attack flow from LiteLLM to cloud breaches

⚡ Key Takeaways

  • Mercor confirms first official TeamPCP victim via LiteLLM creds, exposing 4TB data. 𝕏
  • Wiz reveals TeamPCP's 24-hour cloud enum playbook: IAM, EC2, S3 focus with bold naming. 𝕏
  • Rotate creds now—supply chain credential theft is active, not theoretical. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by SANS Internet Storm Center

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.