Mercor Data Breach
The Mercor breach was a major supply‑chain–driven cyberattack that exposed sensitive data from one of the AI industry’s most important training‑data vendors. It originated from a poisoned update to the open‑source LiteLLM library and quickly escalated into a multi‑terabyte compromise claimed by the Lapsus$ extortion group. What Triggered the Breach The root cause was a supply‑chain compromise of LiteLLM , a Python library downloaded millions of times per day and used to connect applications to AI services. A threat group known as TeamPCP hijacked LiteLLM’s CI/CD pipeline and pushed malicious versions 1.82.7 and 1.82.8 to PyPI for ~40 minutes. These versions contained credential‑harvesting malware . Mercor confirmed it was “one of thousands of companies” affected by the poisoned package. How Attackers Reached Mercor The malicious LiteLLM update harvested credentials from systems that imported the library. Those credentials were then used to pivot deeper into Mercor’s env...