LiteLLM supply-chain attack: wallet-stealing code in PyPI releases steals crypto secrets

Crypto security firm SafeDep says hackers inserted a crypto wallet-stealing payload into LiteLLM, a widely used AI interface for connecting to 100+ LLM providers. On Mar. 24 (10:39–16:00 UTC), attackers who accessed a maintainer account published two malicious LiteLLM versions on PyPI: 1.82.7 and 1.82.8. PyPI quarantined the builds around 11:25 UTC and LiteLLM removed them after detection. LiteLLM versions targeted secret-rich developer environments by collecting SSH keys, environment variables, cloud credentials, Kubernetes secrets, and crypto wallet-related files. The malware searched for Bitcoin wallet configuration files and wallet*.dat, Ethereum keystore directories, and Solana validator/authority material under ~/.config/solana (including validator key pairs, vote account keys, and deploy/Anchor directories). It also harvested AWS Secrets Manager/SSM values when valid AWS credentials were found, then created privileged kube-system pods and added persistence (sysmon.py and a systemd unit). SafeDep links the activity to broader TeamPCP-style compromises across tooling ecosystems, where credential theft can quickly convert into wallet drains, signer compromise, or malicious deployments. Key statistics cited: LiteLLM saw an estimated 46,996 downloads in 46 minutes during the window, with version 1.82.8 accounting for 32,464 downloads. SafeDep also notes 2,337 dependent PyPI packages allowed the affected version range (88%) at the time. For traders, the immediate market impact depends on whether any onchain theft follows. Still, the event is a risk-off signal for crypto infrastructure and validator/DeFi operational security, and it can drive short-term volatility around BTC/ETH/SOL exposures and exchange/validator trust.
Bearish
该新闻核心是“LiteLLM 供应链投毒(PyPI)”导致的 crypto wallet-stealing 风险:恶意代码可同时窃取 SSH/云凭证/Kubernetes secrets,并定向搜集 BTC/ETH/SOL 的钱包或验证者关键材料。这意味着一旦受影响团队在构建机、CI runner 或集群环境中安装了受污染依赖,就可能把“凭证泄露”升级为“钱包被盗/签名器被攻破/验证者控制权丢失”。 类似事件在过去常见的交易效应是: - 短期:市场先对“基础设施风险”做风险折价,偏向卖出与降低杠杆敞口;若没有立刻披露盗币/敲诈进展,冲击可能受限但情绪仍偏谨慎。 - 中期/长期:若攻击者在检测前完成持久化与密钥/钱包材料收集,链上损失可能延迟发生,届时通常会引发与受害方/生态相关的波动(例如安全漏洞后 TVL 下滑、代币波动放大)。 文章提到 PyPI 已隔离并删除恶意构建,但并不等于“已完全清零暴露”。文章同时给出下载量、依赖包扩散范围与受影响窗口,意味着仍存在后续披露风险与监管/审计成本上升的预期。对交易者而言,整体更可能构成风险信号而非直接利好,因此判定为偏 bearish。