The TeamPCP threat actor executed a sophisticated supply chain attack on LiteLLM, a popular AI development library downloaded millions of times daily, turning developer endpoints into systematic credential harvesting operations. The attack compromised LiteLLM packages versions 1.82.7 and 1.82.8 on PyPI, injecting infostealer malware that activated when developers installed or updated the package.

The malware specifically targeted SSH keys, cloud credentials, Kubernetes secrets, environment variables, and crypto wallet material stored on developer machines. This incident proves how valuable developer workstations have become as attack targets, containing credentials that are created, tested, cached, copied, and reused across services, bots, build tools, and AI agents.