Security
Mercor Confirms 4TB Data Breach via LiteLLM Supply Chain Attack; Lapsus$ Claims Credit
A rogue PyPI package lurked for just 40 minutes — long enough to compromise an estimated 36% of cloud environments and freeze Meta’s AI data operations.
Mercor, the AI-era talent platform that recruits expert data labelers for Anthropic, OpenAI, and Meta and carries a $10 billion valuation, confirmed a 4-terabyte data breach late Thursday. The notorious extortion group Lapsus$ claimed responsibility, asserting they planted malicious code inside LiteLLM packages 1.82.7 and 1.82.8, which were live on the Python Package Index for approximately 40 minutes before being pulled.
Security researchers estimate that the brief PyPI window was nonetheless sufficient to affect roughly 36% of cloud environments running automated dependency installation — a figure that reflects how deeply LiteLLM is embedded in the modern AI development stack as a unified gateway for calling multiple LLM APIs. The compromised packages included a dependency-exfiltration payload targeting API keys, model output logs, and contractor metadata.
The blast radius extends beyond Mercor itself. Meta reportedly froze its AI data labeling work pending a full audit of affected pipelines, while downstream customers were advised to rotate all API keys provisioned through LiteLLM in the affected version window. Mercor stated it has notified affected individuals and is cooperating with federal law enforcement.
The incident reignites long-standing concerns about AI supply chain hygiene. LiteLLM’s position as a near-ubiquitous abstraction layer means that a single compromised release version becomes an extraordinarily high-leverage attack surface — one that threat actors like Lapsus$, who specialize in social engineering and insider-access attacks, are clearly aware of.