Ethical Hacking News
AI recruiting startup Mercor has confirmed that it was one of thousands of companies affected by a supply chain attack involving LiteLLM. The company's admission comes as claims made by extortion crew Lapsus$ highlight the growing concern surrounding software supply chain vulnerabilities.
Mercor AI recruiting startup has acknowledged a supply chain attack involving LiteLLM. The attackers stole 4 TB of Mercor's source code, including 939 GB of source code, as well as other sensitive data. Mercor is conducting an investigation with third-party forensics experts and devoting resources to resolve the matter. The incident highlights growing concern surrounding supply chain attacks in the tech industry. The attack raises questions about cybersecurity measures and the need for greater transparency and cooperation between companies and security experts. Sophisticated extortion groups have targeted software supply chains, emphasizing the importance of robust security measures and vigilance. Other high-profile incidents involving software supply chain attacks include breaches at Trivy, Cisco, and others.
Mercor, an AI recruiting startup, has recently acknowledged that it was one of thousands of companies affected by a supply chain attack involving LiteLLM. The admission comes in the wake of claims made by the extortion crew Lapsus$ that they stole 4 TB of Mercor's source code, including 939 GB of source code from the company, as well as other sensitive data.
According to Mercor's statement, which was shared on social media, the company's security team promptly responded to the incident and is conducting a thorough investigation with the help of third-party forensics experts. The company has also pledged to devote resources necessary to resolve the matter as soon as possible.
This development highlights the growing concern surrounding supply chain attacks in the tech industry. Supply chain attacks involve exploiting vulnerabilities in software or hardware components that are used throughout an entire system, allowing attackers to access sensitive data and disrupt operations. In this case, the attack on LiteLLM appears to have had far-reaching consequences, with multiple companies affected by the breach.
The incident raises questions about the effectiveness of cybersecurity measures in place to protect against such attacks. It also highlights the need for greater transparency and cooperation between companies and security experts in identifying and responding to supply chain vulnerabilities.
Furthermore, this incident demonstrates how sophisticated and organized extortion groups have become in targeting software supply chains. The attackers, believed to be associated with the TeamPCP crew, are thought to have gained access to Mercor's company data following a compromise of the LiteLLM supply chain attack. This breach highlights the importance of robust security measures and vigilance in protecting against such attacks.
In recent weeks, there have been several high-profile incidents involving software supply chain attacks, including breaches at Trivy, Cisco, and others. These incidents demonstrate the widespread nature of the problem and the need for urgent action to address it.
The incident also serves as a reminder that cybersecurity is an ongoing process that requires constant vigilance and cooperation among stakeholders. As the use of AI and machine learning technologies continues to grow in various industries, the potential for supply chain attacks will only increase.
In response to this growing concern, companies like Mercor are taking proactive steps to strengthen their security measures and prevent similar breaches from occurring in the future. The incident serves as a wake-up call for the tech industry, emphasizing the importance of robust cybersecurity practices, transparency, and cooperation among stakeholders to mitigate the risks associated with supply chain attacks.
In addition, this incident highlights the growing need for greater awareness and education about cybersecurity best practices and supply chain security. As more companies become aware of the potential vulnerabilities in their software supply chains, they can take steps to address these issues and prevent similar breaches from occurring in the future.
Overall, Mercor's admission of compromise serves as a reminder of the importance of robust security measures, transparency, and cooperation among stakeholders in preventing supply chain attacks. The incident highlights the need for greater awareness and education about cybersecurity best practices and supply chain security, and underscores the urgent need for action to address this growing concern.
Related Information:
https://www.ethicalhackingnews.com/articles/Ai-Supply-Chain-Attack-Mercors-Admission-of-Compromise-Highlights-Industry-Wide-Vulnerabilities-ehn.shtml
https://go.theregister.com/feed/www.theregister.com/2026/04/02/mercor_supply_chain_attack/
https://www.msn.com/en-us/technology/cybersecurity/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/ar-AA1ZRcwf
https://securityshelf.com/2026/04/01/ai-recruiting-biz-mercor-says-it-was-one-of-thousands-hit-in-litellm-supply-chain-attack/
https://www.cisa.gov/sites/default/files/2023-08/CSRB_Lapsus$_508c.pdf
https://en.wikipedia.org/wiki/Lapsus$
https://thecybersecguru.com/news/teampcp-supply-chain-attack/
https://cyble.com/threat-actor-profiles/teampcp/
Published: Wed Apr 1 19:30:13 2026 by llama3.2 3B Q4_K_M