Mercor confirms it was hit by LiteLLM supply chain attack as Lapsus$ claims 4TB data theft

2 Sources

Share

AI recruiting startup Mercor has confirmed a security incident linked to the compromise of open-source LiteLLM project, becoming the first major company to publicly acknowledge being affected. Extortion group Lapsus$ claims to have stolen 4TB of data including 939GB of source code, though the connection between TeamPCP's initial attack and Lapsus$'s involvement remains unclear.

Mercor Becomes First Major Victim to Confirm LiteLLM Breach

Mercor, an AI recruiting startup valued at $10 billion, has publicly confirmed it was compromised in a supply chain attack involving the open-source LiteLLM project

1

. The company stated it was "one of thousands of companies" affected by the recent compromise of open-source LiteLLM's infrastructure, which security researchers have linked to hacking group TeamPCP

2

. Founded in 2023, Mercor works with major AI companies including OpenAI and Anthropic to train AI models by contracting specialized domain experts such as scientists, doctors, and lawyers, facilitating more than $2 million in daily payouts

1

.

Source: TechCrunch

Source: TechCrunch

Lapsus$ Hacking Group Claims Massive Data Theft

Extortion hacking group Lapsus$ has claimed responsibility for a data breach at Mercor, alleging it stole 4TB of data including 939GB of stolen source code from the AI recruiting startup

2

. The Lapsus$ gang posted samples of allegedly stolen data on its leak site, which included material referencing Slack data, ticketing information, and two videos purportedly showing conversations between Mercor's AI systems and contractors on its platform

1

. However, it remains unclear how Lapsus$ obtained the data as part of TeamPCP's cyberattack. Security researchers from Wiz told The Register that "high-profile extortion groups like Lapsus$" are now collaborating with TeamPCP, the crew believed responsible for multiple open source project attacks

2

.

The LiteLLM Supply-Chain Cyberattack Unfolds

The compromise of open-source LiteLLM project surfaced last week after malicious code was discovered in a package associated with the Y Combinator-backed startup's infrastructure

1

. While the malware was identified and removed within hours, the security incident drew immediate scrutiny due to LiteLLM's widespread use across the internet, with the library downloaded millions of times per day according to security firm Snyk

1

. TeamPCP injected credential-stealing malware into multiple popular open-source tools, including publishing malicious versions of LiteLLM and Telnyx to the Python Package Index (PyPI)

2

.

Source: The Register

Source: The Register

Widespread Data Exfiltration Affects Thousands

The scale of the attack extends far beyond Mercor. Threat hunters at vx-underground estimate the attackers have achieved widespread data exfiltration from 500,000 machines

2

. At the RSA Conference last week, Mandiant Consulting CTO Charles Carmakal revealed that Google-owned incident response firm knew of "over 1,000 impacted SaaS environments" actively dealing with the cascading effects of TeamPCP supply chain attacks. Carmakal warned that "1,000-plus downstream victims will probably expand into another 500, another 1,000, maybe another 10,000," adding that "these actors are collaborating with a number of other actors right now"

2

.

TeamPCP's Coordinated Attack Campaign

TeamPCP launched a coordinated campaign targeting multiple open-source projects. The group compromised Trivy, an open-source vulnerability scanner maintained by Aqua Security in late February, injecting credential-stealing malware a month later

2

. In March, TeamPCP deployed the same malware into KICS, an open source static analysis tool maintained by Checkmarx

2

. Security researchers at Wiz observed that "credentials and secrets stolen in the supply chain compromises were quickly validated and used to explore victim environments and exfiltrate additional data"

2

. Following reports that TeamPCP also breached Cisco's internal development environment and stole source code via the Trivy attack, Cisco acknowledged awareness of the situation but stated it had "not seen any evidence of impact on our customers, products, or services"

2

.

Mercor's Response and Industry Implications

Mercor spokesperson Heidi Hagberg confirmed the company "moved promptly" to contain and remediate the security incident, stating they are "conducting a thorough investigation supported by leading third-party forensics experts"

1

. However, Hagberg declined to confirm whether the incident was connected to Lapsus$ claims or whether customer or contractor data had been accessed or misused

1

. The incident prompted LiteLLM to implement changes to its compliance processes, including shifting from controversial startup Delve to Vanta for compliance certifications

1

. Cloud security experts warn that while Mercor is the first downstream company to publicly confirm victimization, it won't be the last, as investigations continue to uncover the full scope of this supply chain attack

2

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo