On March 24, 2026, the threat actor TeamPCP published two back-doored versions of the Python package litellm (versions 1.82.7 and 1.82.8) to PyPI.
The malicious versions contained a credential harvester targeting SSH keys, cloud credentials, Kubernetes secrets, and .env files, along with a Kubernetes lateral movement toolkit and a persistent systemd backdoor. Version 1.82.8 used a .pth file to execute the payload on every Python process startup in the environment, not just when litellm was imported.
Both versions have since been removed from PyPI. Full details are available in the Hacker News coverage.
How to check with Arnica
Arnica customers can search their SBOM for the impacted packages directly from the platform by filtering for "LiteLLM (Mar 2026)" in the advanced search:

Recommended Actions
Not finding evidence in the SBOM is a good first step, but developers may have installed the package on their workstations outside of your tracked repositories. We recommend the following actions across all systems:
Ensure no impacted version (1.82.7 or 1.82.8) exists on any system, e.g. pip show litellm (Check all Python virtual environments on the system, not just the default one)
Inspect uv caches e.g. find:
~/.cache/uv - name "litellm_init.pth"If found, revert to a known-clean version and purge package manager caches (pip cache purge or rm -rf ~/.cache/uv)
Isolate affected hosts
Check for rogue node-setup-* pods in the kube-system namespace on any Kubernetes clusters
Review network logs for egress to:
models.litellm[.]cloud and checkmarx[.]zone Remove any persistence mechanisms (look for sysmon.service under systemd and ~/.config/sysmon/)
Rotate all potentially exposed credentials
Reduce Risk and Accelerate Velocity
Integrate Arnica ChatOps with your development workflow to eliminate risks before they ever reach production.



