{"id":60381,"date":"2026-03-26T00:00:00","date_gmt":"2026-03-26T00:00:00","guid":{"rendered":"urn:uuid:f6b39715-a45b-518b-f5cc-78f6f1d15e41"},"modified":"2026-03-26T00:00:00","modified_gmt":"2026-03-26T00:00:00","slug":"your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/","title":{"rendered":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/26\/c\/litellm-compromise-thumb.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">The&nbsp;\u2018.pth\u2019&nbsp;mechanism: A&nbsp;known&nbsp;risk,&nbsp;accepted<\/span><\/p>\n<p>Python&#8217;s .pth&nbsp;file processing is a documented feature, not a bug. Files ending in .pth&nbsp;placed in site-packages are processed automatically every time the Python interpreter starts.&nbsp;CPython&nbsp;core developers have discussed this risk, Issues&nbsp;#<a href=\"https:\/\/github.com\/python\/cpython\/issues\/113659\">113659<\/a>&nbsp;and&nbsp;#<a href=\"https:\/\/github.com\/python\/cpython\/issues\/78125\">78125<\/a>, but&nbsp;treated it as a &#8220;won&#8217;t fix&#8221; because restricting .pth&nbsp;execution would break legitimate use cases.<\/p>\n<p>Issue #113659 was addressed, and Python versions 3.8 through 3.13 now skip hidden .pth&nbsp;files,&nbsp;which&nbsp;reduces&nbsp;some risk.&nbsp;Although&nbsp;the broader proposal to deprecate or remove .pth&nbsp;code execution entirely (Issue #78125)&nbsp;remains&nbsp;unresolved, these partial mitigations&nbsp;demonstrate&nbsp;ongoing efforts within the&nbsp;CPython&nbsp;community to balance security concerns with backwards compatibility.<\/p>\n<p>This&nbsp;isn&#8217;t&nbsp;the first exploitation:&nbsp;<a href=\"https:\/\/www.volexity.com\/blog\/2024\/05\/15\/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices\/\">Volexity<\/a>&nbsp;observed .pth&nbsp;abuse in CVE-2024-3400 exploitation.<\/p>\n<p>The&nbsp;npm&nbsp;track (checkmarx-util-1.0.4) followed an identical pattern but&nbsp;targeted&nbsp;DevSecOps&nbsp;engineers through a fake&nbsp;Checkmarx&nbsp;utility package. It was served directly from attacker-controlled infrastructure at&nbsp;checkmarx.zone&nbsp;rather than the public&nbsp;npm&nbsp;registry, with a&nbsp;postinstall&nbsp;hook&nbsp;triggering automatic execution. Internal timestamps were set to October 26, 1985, the &#8220;Back to the Future&#8221; date, a deliberate anti-forensic Easter egg from a Western-culture-aware operator.<\/p>\n<p><span class=\"body-subhead-title\">From&nbsp;one IP to a&nbsp;multi-ecosystem&nbsp;campaign<\/span><\/p>\n<p>The GitHub issue gave defenders a starting point. Our analysis began with a single seed IOC, IP address 83.142.209.11, and expanded through five systematic enrichment pivots over 50 minutes, consuming 34&nbsp;VirusTotal&nbsp;API calls. What&nbsp;emerged&nbsp;was not a single-package&nbsp;compromise&nbsp;but a coordinated, multi-ecosystem supply chain campaign we track as&nbsp;TeamPCP.<\/p>\n<p><b>Three&nbsp;supply&nbsp;chain&nbsp;tracks,&nbsp;one&nbsp;actor<\/b><\/p>\n<p>All three tracks converged on the same encryption scheme (AES-256-CBC + RSA-4096-OAEP), the same credential&nbsp;targets, the same persistence mechanism, and the same&nbsp;C&amp;C&nbsp;infrastructure, confirming a single unified toolchain. The actor embedded their own branding throughout: &#8220;TeamPCP&#8221; strings in payload code, &#8220;tpcp.tar.gz&#8221; as the exfiltration archive name, and cultural artifacts like the code comment &#8220;ICP y u no radio?&nbsp;;w;&#8221;, an English-language internet-culture reference that would later factor into attribution analysis.<\/p>\n<p>The credentials harvested from&nbsp;Trivy&nbsp;CI\/CD runners became the keys to&nbsp;subsequent&nbsp;compromises, each expanding the campaign&#8217;s reach:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">npm&nbsp;(March 20):&nbsp;<span>Less than 24 hours after the&nbsp;Trivy&nbsp;compromise,&nbsp;TeamPCP&nbsp;deployed a self-propagating worm \u2014 dubbed&nbsp;CanisterWorm&nbsp;by Aikido researchers \u2014 across the&nbsp;npm&nbsp;ecosystem. The worm stole&nbsp;npm&nbsp;tokens from&nbsp;compromised runners,&nbsp;enumerated&nbsp;all packages the tokens had&nbsp;publish&nbsp;access to, and published malicious versions automatically. Twenty-eight packages in the&nbsp;<i>@EmilGroup<\/i>&nbsp;scope were infected in under 60 seconds. The worm used an Internet Computer Protocol (ICP) canister as its command-and-control dead-drop \u2014 the first documented use of ICP for C&amp;C, according to Aikido. ICP canisters cannot be taken down by traditional domain registrar or hosting&nbsp;provider&nbsp;action.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Checkmarx&nbsp;KICS (March 23):&nbsp;<span>Using&nbsp;compromised&nbsp;Checkmarx&nbsp;credentials,&nbsp;TeamPCP&nbsp;hijacked all 35 tags (v1 through v2.1.20) of the KICS GitHub Action, an infrastructure-as-code security scanner. Two malicious VS Code extensions were also published&nbsp;to&nbsp;the&nbsp;OpenVSX&nbsp;marketplace. The payload used a new C&amp;C&nbsp;domain (<i>checkmarx[.]zone)<\/i>&nbsp;but&nbsp;contained&nbsp;the same RSA-4096 public key and&nbsp;<i>tpcp.tar.gz<\/i>&nbsp;exfiltration naming as the&nbsp;Trivy&nbsp;payload, confirming shared infrastructure.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">Docker&nbsp;Hub&nbsp;(March 22):&nbsp;<span>Malicious&nbsp;Docker&nbsp;images (<i>aquasec\/trivy:0.69.5&nbsp;and&nbsp;0.69.6<\/i>) were pushed directly to&nbsp;Docker&nbsp;Hub&nbsp;using&nbsp;compromised credentials, bypassing the GitHub release process entirely. These images propagated to third-party mirrors including&nbsp;<i>mirror.gcr.io<\/i>.<\/span><\/span><\/li>\n<li><span class=\"rte-red-bullet\">PyPI&nbsp;\u2014&nbsp;LiteLLM&nbsp;(March 24):&nbsp;<span>The cascade reached&nbsp;LiteLLM&nbsp;when its CI\/CD pipeline ran the&nbsp;compromised&nbsp;Trivy&nbsp;as part of its build process. The malicious&nbsp;Trivy&nbsp;code harvested the&nbsp;<i>PYPI_PUBLISH<\/i>&nbsp;token from the GitHub Actions runner environment. The&nbsp;LiteLLM&nbsp;maintainer confirmed this was the attack vector: the&nbsp;compromise&nbsp;&#8220;originated from the&nbsp;trivvy&nbsp;[sic] used in our ci\/cd&#8221;<\/span><\/span><\/li>\n<\/ul>\n<p><b>Infrastructure: 90&nbsp;days of&nbsp;preparation&nbsp;for a 48-hour&nbsp;attack<\/b><\/p>\n<p>The infrastructure behind&nbsp;TeamPCP&nbsp;reveals disciplined operational planning that contrasts sharply with the eventual campaign detection timeline:<\/p>\n<p>Both&nbsp;C&amp;C&nbsp;nodes, 83.142.209.11 (checkmarx[.]zone) and 46.151.182.203 (LiteLLM[.]cloud), were hosted on AS205759, a bulletproof hosting provider&nbsp;operating&nbsp;under Ghosty Networks LLC \/ DEMENIN B.V. with a Netherlands\/Ukraine jurisdictional gap exploited for abuse reporting friction. JARM TLS fingerprinting revealed identical server configurations across both nodes, a fingerprint inconsistent with commodity nginx and consistent with the AdaptixC2 framework, an&nbsp;open-source&nbsp;Go&nbsp;C&amp;C&nbsp;toolkit.<\/p>\n<p>AdaptixC2&#8217;s developer, &#8220;RalfHacker,&#8221; has been linked to the Russian criminal underground.&nbsp;The framework has been used by an Akira ransomware affiliate, based on infrastructure overlap, though the strength of this attribution link&nbsp;warrants&nbsp;caution.<\/p>\n<p><b>The&nbsp;kill&nbsp;switch: A YouTube URL as a&nbsp;global \u201coff\u201d&nbsp;switch<\/b><\/p>\n<p>One of the campaign&#8217;s most operationally notable features was its deactivation mechanism. Both supply chain tracks installed a persistence daemon that polled the&nbsp;C&amp;C&nbsp;server every 50 minutes. Before executing any stage-2 payload, the daemon checked whether the response&nbsp;contained&nbsp;the word &#8220;youtube&#8221;, if&nbsp;so, execution was silently skipped.<\/p>\n<p>At the time of our analysis, the \/raw endpoint was serving a 43-byte YouTube URL. The kill switch was active. Every&nbsp;compromised host with a running persistence daemon had been globally deactivated without requiring individual&nbsp;C&amp;C&nbsp;commands. The choice of &#8220;youtube&#8221; as the&nbsp;trigger is&nbsp;pragmatic,&nbsp;a YouTube URL naturally&nbsp;contains&nbsp;the string, making the deactivation response appear as benign content if intercepted by network monitoring.<\/p>\n<p>Whether the actor&nbsp;triggered the kill switch because they detected the on-going analysis, completed a harvesting cycle, or wanted to reduce forensic exposure&nbsp;remains&nbsp;an open question. The mechanism&nbsp;demonstrates&nbsp;operational maturity, the ability to globally shut down a campaign with a single server-side change, though this pattern has been&nbsp;observed&nbsp;in other criminal&nbsp;C&amp;C&nbsp;frameworks and is not unique to this campaign.<\/p>\n<p><b>The&nbsp;bot suppression&nbsp;campaign: Information&nbsp;warfare&nbsp;meets&nbsp;vulnerability&nbsp;disclosure<\/b><\/p>\n<p>Within minutes of the GitHub issue being filed, something unusual happened: a wave of comments flooded the thread.<\/p>\n<p>According to community analysis:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><a href=\"https:\/\/github.com\/BerriAI\/litellm\/issues\/24512\">121&nbsp;compromised GitHub accounts<\/a>&nbsp;activated within minutes of disclosure<\/span><\/li>\n<li><span class=\"rte-red-bullet\">StepSecurity documented 196+ bot comments flooding the thread, the majority generic praise spam identical to patterns&nbsp;observed&nbsp;in the&nbsp;Trivy&nbsp;compromise<\/span><\/li>\n<li>&nbsp;<\/li>\n<\/ul>\n<p>Flooding&nbsp;the&nbsp;GitHub&nbsp;issue with noise&nbsp;was&nbsp;likely done&nbsp;to delay triage and community response. This is a notable operational TTP;&nbsp;previous&nbsp;supply chain attacks relied on stealth and hoped for slow detection.&nbsp;TeamPCP&nbsp;actively fought disclosure.<\/p>\n<p>Whether this&nbsp;constitutes&nbsp;&#8220;information warfare applied to vulnerability disclosure&#8221; or automated spam from a botnet operator selling services depends on the actor&#8217;s organizational structure, which&nbsp;remains&nbsp;unconfirmed.&nbsp;What&#8217;s&nbsp;clear is that the suppression capability was pre-positioned and activated rapidly.<\/p>\n<p><span class=\"body-subhead-title\">Who is TeamPCP?<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/26\/c\/inside-litellm-supply-chain-compromise.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date that cascaded through developer tooling and compromised LiteLLM, exposing how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9511,9555,9534,9509,9624],"class_list":["post-60381","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-exploitsvulnerabilities","tag-trend-micro-research-latest-news","tag-trend-micro-research-research","tag-trend-micro-research-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise\",\"datePublished\":\"2026-03-26T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\"},\"wordCount\":1286,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Exploits&amp;Vulnerabilities\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Research\",\"Trend Micro Research : Threats\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\",\"name\":\"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\",\"datePublished\":\"2026-03-26T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage\",\"url\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\",\"contentUrl\":\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/","og_locale":"en_US","og_type":"article","og_title":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2026-03-26T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise","datePublished":"2026-03-26T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/"},"wordCount":1286,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cyber Threats","Trend Micro Research : Exploits&amp;Vulnerabilities","Trend Micro Research : Latest News","Trend Micro Research : Research","Trend Micro Research : Threats"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/","url":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/","name":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80","datePublished":"2026-03-26T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/litellm-compromise-thumb:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-ai-gateway-was-a-backdoor-inside-the-litellm-supply-chain-compromise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=60381"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/60381\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=60381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=60381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=60381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}