Automatically translated.View original post

LiteLLM was found buried with malware in the Depedency.

An AI with millions of users like LiteLLM has been found embedded with malware in the Depedency where the AI itself is active.

Artificial intelligence or AI, especially the large language model (LLM or Large Language Model), has facilitated many different tasks, but hackers have implemented it in ways that many people might expect.

According to a report by the Techcrunch website, an abnormality has been detected on an LLM-based AI called LiteLLM under the company's development, an open source project that allows users to access up to 100 models of AI tools, making it so popular that it has 3.4 million daily users. It has also been reviewed in up to 40 thousand stars on GitHub, and thousands of forks, although it has many advantages, but there is a researcher from FutureSearch, a company that provides services. The AI Agent, to help with web research, has detected that the Dependency extension of this AI tool has malware code inserted. Dependency means that software associated with this AI will also be affected. This malware has been verified and found to be capable of stealing login codes from both AI and related software. This malware is highly dangerous.

But by coincidence, such researchers were able to detect this malware because after downloading the AI tool on it, it automatically shut down the researcher's machine due to a bug inside the malware that resulted from the poor coding of the hackers behind it. After the machine was shut down, the researchers tried to determine why it eventually led to the malware being detected.

After the malware was detected and the researchers reported the detection back to the developer of this AI tool, the developer actively investigated and corrected the problem. In this case, there were people who were deeply skeptical of the transparency of the developer of this AI tool, because the developer claimed on the website that it had received high-standard certificates like SOC2 and ISO 27001. But there were people who detected that the developer was using the company that issued the certificate as a startup called Delve, which has a history of alleged use of fake data to lie to customers about its credentials. The company, as well as hiring auditors, signed a rubber-stamp audit and immediately issued certificates, making it considered that the certificates were fake. Delve immediately denied the allegations, and the management of the LiteLLM project did not comment on the allegations.

How will the associated malware cases and reservations end? Ask interested parties and people who have used them to follow the news closely.

# Trending # Lemon 8 Howtoo # lemon 8 diary # litellm # freedomhack

1 day agoEdited to

... Read moreเคยได้ยินข่าวเกี่ยวกับการถูกฝังมัลแวร์ในซอฟต์แวร์ AI ที่ใช้งานบ่อย ๆ อย่าง LiteLLM แล้วคิดว่ามันเป็นเรื่องไกลตัว แต่ถ้าวันหนึ่งเราต้องใช้ AI เหล่านี้ในงานที่สำคัญ เช่น การช่วยวิเคราะห์ข้อมูล หรือช่วยเขียนโค้ด การที่มีมัลแวร์แฝงอยู่ใน Dependency ที่ไม่ได้รับการตรวจสอบอย่างละเอียดอาจส่งผลกระทบหนักมากกับข้อมูลส่วนตัวและความปลอดภัยของเรา จากประสบการณ์ส่วนตัว เวลาเราเลือกใช้ซอฟต์แวร์ โดยเฉพาะโปรเจ็ค Open Source ที่ดูเหมือนจะปลอดภัย ก็ยังควรต้องระวังให้มากขึ้น เพราะแฮกเกอร์อาจสร้างโค้ดมัลแวร์แอบแฝงในส่วนขยายเพื่อที่จะขโมยข้อมูลรหัสผ่านหรือข้อมูลสำคัญอื่น ๆ ได้ โดยเฉพาะเมื่อซอฟต์แวร์นั้นมีผู้ใช้งานจำนวนมากอย่าง LiteLLM ที่ได้รับความนิยมสูง หมายความว่าความเสียหายจะเกิดขึ้นกับผู้ใช้นับล้านได้ อีกเรื่องที่น่าสนใจคือใบรับรอง SOC2 และ ISO 27001 ซึ่งเป็นมาตรฐานด้านความปลอดภัยของข้อมูล ที่โปรเจ็ค LiteLLM ได้ยกขึ้นมาอ้างอิง แต่กลับพบว่าบริษัทที่ออกใบรับรองนั้นเป็นสตาร์ทอัพที่มีข้อสงสัยเกี่ยวกับความน่าเชื่อถือ ช่วยทำให้ผู้ใช้งานต้องตั้งคำถามถึงความโปร่งใสและความน่าเชื่อถือของซอฟต์แวร์ที่ใช้อยู่ สิ่งที่อยากฝากคือการติดตามข่าวสารและอัพเดตความเคลื่อนไหวเกี่ยวกับซอฟต์แวร์หรือ AI ที่เราใช้อยู่เป็นประจำ รวมถึงตรวจสอบสิทธิ์การเข้าถึงและความปลอดภัยในระบบให้ดี เพื่อป้องกันการถูกโจมตีจากมัลแวร์ที่เราไม่ทันตั้งตัว ในยุคที่เทคโนโลยี AI ถูกนำมาใช้กันอย่างกว้างขวางนี้ ความรู้เรื่องความปลอดภัยไซเบอร์จึงต้องเพิ่มพูนขึ้นตามไปด้วย จากกรณีนี้ ยังเป็นบทเรียนว่าผู้ใช้งานต้องมีส่วนร่วมในการตรวจสอบและระมัดระวัง ไม่เชื่อถือคำโฆษณาหรือใบรับรองเพียงอย่างเดียว แต่ควรตรวจสอบและเรียนรู้ข้อมูลที่แท้จริง เพราะความปลอดภัยไซเบอร์นั้นไม่มีใครดูแลเราได้ดีไปกว่าตัวเราเอง

Related posts

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

8 likes

Smart Slider 3 Pro Used In Supply Chain Attack
Attackers compromised the update infrastructure for Smart Slider 3 Pro and pushed a weaponized build - version 3.5.1.35 - through the official update channel. The compromised version was live for approximately six hours before it was caught. Only the Pro version was affected, but any site that inst
Wordfence

Wordfence

1 like

30+ WordPress Plugins Used In Supply Chain Attack
30+ WordPress Plugins Used In Supply Chain Attack | Wordfence Security News Clip | April 13, 2026 A buyer acquired more than 30 WordPress plugins through the Flippa marketplace after purchasing the Essential Plugin portfolio for a six-figure sum. The buyer's first code commit was a backdoor
Wordfence

Wordfence

1 like

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

Free SVG files for Cricut Design Space. If you’re dealing with crafter’s block, this website has tons of free SVG downloads to spark new project ideas for shirts, stickers, bookmarks, and more. Save this for your next Cricut project and start creating again 💕 #designinspo #creativeart
VlunaWorks

VlunaWorks

3 likes

#evakuasi #sidoajo #fyp
abesso

abesso

1 like

#tvshow #thecapture
nicemovie💕💕

nicemovie💕💕

2 likes

Supply Chain Attack on 30+ WordPress Plugins
Supply Chain Attack on 30+ WordPress Plugins | Wordfence Security News Clip | April 13, 2026 A buyer acquired more than 30 WordPress plugins through the Flippa marketplace after purchasing the Essential Plugin portfolio for a six-figure sum, then planted a backdoor in every plugin as their very
Wordfence

Wordfence

1 like

ERROR ERROR ERROR ERROR ERROR
🔺️!!!Flashy!!!🔺️ Um guys... Something is definitely wrong with my tablet 😬😨 #rewritesonic #malware #sonicexe #sonicthehedgehog #sonicfanart
EmK & Fidgi

EmK & Fidgi

2 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

39 likes

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

If you’re staring at Cricut Design Space with zero ideas this is for you! This free SVG website is perfect when you need inspiration fast. Save & share with your crafty bestie 💖 #designinspo #creativeart #DesignProcess #cricutprojects #CricutTutorial
VlunaWorks

VlunaWorks

1 like

How to Make a Dyson Sphere in Sandboxels
#dysonsphere #science #sciencegames #gaming #pixelart
R74n

R74n

7 likes

#creatorsearchinsights #therapeutictiktok #somatichealing #storedtrauma #yellowstonetv
Rawr xD Yuna🌙The.Terror.

Rawr xD Yuna🌙The.Terror.

0 likes

The #Python Foundation turned down a $1.5m grant from #nsf so they could continue to support #DEI . Please make sure to go support python.org so they can continue to do great things.
Bentley Hensel

Bentley Hensel

9 likes

A critical alert details widespread vulnerabilities in GitHub Actions workflows within open-source projects like MITRE and Splunk, exposing critical security flaws.
A high-severity alert describes new SuperCard Malware hijacking Android phones to relay payment card data from users to attackers, stealing financial information.
A low-severity alert announces Microsoft 365 will disable legacy authentication protocols by default, blocking file access to SharePoint, OneDrive, and Office for enhanced security.
𝐓𝐨𝐩 𝐂𝐲𝐛𝐞𝐫 𝐓𝐡𝐫𝐞𝐚𝐭𝐬 𝐘𝐨𝐮 𝐒𝐡𝐨𝐮𝐥𝐝𝐧’𝐭 𝐌𝐢𝐬𝐬 (𝐉𝐮𝐧𝐞 𝟏𝟖)
🧠 Insecure GitHub Actions in open source projects like MITRE & Splunk open doors to major vulnerabilities. 📲 SuperCard Malware hijacks Androids to relay payment card data. 🧑‍🎮 Stargazers Malware targets Minecraft mod users with info-stealers. 🧠 ChainLink Phishing exploits trusted domains lik
statsonstats

statsonstats

0 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

A series I’ve wanted to do forever! As a cyber security expert and bridal makeup artist I hope to share cyber concepts in easy to understand makeup metaphors! Let me know in the comments what topics interest you 💕 #makeupandmalware #mascara #cybersecurity @Lancôme
Betsy H

Betsy H

3 likes

#batman is not the world’s greatest detective in fact he’s like the latest detective to find the guild. The world’s greatest detective is #detectivechimp #dccomics
Dan!

Dan!

3 likes

#fy #fyp #fypシ゚viral #horrorgame Just tired of getting jumped😭, go subscribe to my YT channel.
dis-MALware

dis-MALware

3 likes

#podcast #podcastclips #tools #fyp #diy #satisfying #story #relaxingvideos #nba
Kalani Vesey

Kalani Vesey

0 likes

Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

Network Security
In today's interconnected world, network security is more crucial than ever. As technology advances, cyber threats are becoming increasingly sophisticated, putting your personal data and business at risk. In this video, we'll delve into the basics of network security, explaining what it is,
Olo_Bugenyi

Olo_Bugenyi

1 like

Setting Spray is the makeup equivalent to mulifactor authentication and it’s a must have! Follow along to learn more about cybersecurity from a pro makeup artist and cyber expert 🤌🏻
Betsy H

Betsy H

1 like

CYBER WEAPONS CAN CRASH NATIONS IN SECONDS
Zona

Zona

4 likes

3/11 Breaking news tonight involving cybersecurity and national security. According to new reporting, a pro-Iran hacking group says it carried out a cyberattack targeting the U.S. medical technology company Stryker Corporation. The company confirmed it is investigating the incident, but says
jordanamplifies

jordanamplifies

1 like

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

148 likes

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

Indiana Mish (meesh)

Indiana Mish (meesh)

0 likes

Unable to Initialize Hard Drive? Fix it Now
Find out how you can fix this issue and initialize your hard drive with ease using Partition Assistant, ensuring no data is lost during the process. #hdd #fix #repair #disk
SmoothTechie

SmoothTechie

0 likes

How to Fix Computer Keeps Blue Screening
Why is your computer keeps blue screening and how to fix it? This article gives full explanation to it and provides full guide to help your computer return to normal. #bluescreen #bsod #computerscience #fix #windows
Techcrafter

Techcrafter

1 like

#movie #foryou #fyp
Lllla.movie

Lllla.movie

3 likes

A phone screen displays eSIM settings, showing an active AT&T eSIM with a phone number, an option to add a new eSIM, and primary SIM settings.
The title of an article, 'What Can Someone Do With Your SIM Card? (How To Secure It)', published on February 8, 2024, with author details.
Text discussing the risks of a stolen SIM card, including an example of $68,000 stolen via a SIM swap, and noting the rise in SIM card attacks.
my physical sim card from my original AT&T smartphone has been stolen out of my Samsung Galaxy Fold7
Dougintime

Dougintime

4 likes

productivity apps on your mac!
Proton VPN for staying secure online and Grammarly for making sure I don’t send embarrassing emails literally two apps I use daily to stay productive without the stress. If you’re not using them yet, you’re missing out! #lemon8partner #lemon8creator #tech #apps #productivity
asmae🐸

asmae🐸

19 likes

Two 'Paint' program windows display stylized 3D characters: a winking blue Sonic-like figure on the left and a pink Amy Rose-like figure on the right. Both are rendered in a low-poly style within classic Windows UI, set against a colorful abstract background.
Rewrite and Malware
The two still frames from the Rewrite and Malware video :3 I forgot to post this sooner (^_^;) ~^v^~ The background and windows are free pngs I downloaded and gently edited. ( ^ω^ ) #rewritesonic #malware #rewritesonicfanart #rewritesonicart #sonicfandom
EmK & Fidgi

EmK & Fidgi

1 like

China Checkmate to the US #igorkryan #chinapower #checkmate #taiwaninvasion
Igor Kryan

Igor Kryan

3 likes

Oscar Esparza Hacker

Oscar Esparza Hacker

0 likes

Kpop boy groups I stan
I'm a kpop Stan so I decided to show which boy groups I Stan #kpop #straykids #ENHYPEN #tomorrowxtogether #ateez #SEVENTEEN #p1harmony
Susan

Susan

1 like

This is the newest way people are getting hacked and if you use AI to answer your questions and give you advice, you need to watch this.Thanks to Huntress for reporting this Follow for more
Cybersecurity Girl

Cybersecurity Girl

15 likes

⚠️ Do NOT run this .exe file or else Liam Neeson will find ya #interesting #filspixel #storytime #computer #fypシ #malware #wannacry #windows #fyp #foryoupage #foryou #trojan #virus #tiktok #viral
yulianavilla

yulianavilla

0 likes

Free Games! ✅
Free Games! ✅ Yes it’s trusted by many people and it’s the best in the industry! And no malware or virus! Follow for more value! 😉 #freegames #pcgamers #steamgames #gamer #tech
Tech With Unes

Tech With Unes

7 likes

External Hard Drive Showing Empty? How to Fix?
Plugged in your external hard drive but found it empty? Here are a few easy fixes you can try! If your files are lost, use AOMEI FastRecovery to bring them back. Giveaway license code: code.aomeitech.com Discount code: Special30OFF  #externalharddrive #recovery #harddrive #empty
SmoothTechie

SmoothTechie

1 like

#Ben10 #alienx #AlienHeroes #Omnitrix #CartoonNetwork PART 02
xwkdevinityemmajo

xwkdevinityemmajo

0 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

113 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

630 likes

See more