Skip to main content
See every side of every news story
Published loading...Updated

Mercor Targeted in LiteLLM Supply Chain Attack

Mercor said it was one of thousands of companies affected, while Lapsus$ claimed 4 TB of data and source code from the startup.

  • AI hiring startup Mercor confirmed on Tuesday it was "one of thousands of companies" affected by a supply chain attack involving LiteLLM, part of a campaign also targeting Telnyx and Trivy.
  • The campaign originated in late February when attackers exploited a misconfiguration in the GitHub Actions environment for Trivy, an open source vulnerability scanner maintained by Aqua Security, to steal privileged access tokens.
  • Mandiant Consulting CTO Charles Carmakal estimated over 1,000 SaaS environments are currently dealing with the threat, warning that downstream victims could expand to "another 500, another 1,000, maybe another 10,000."
  • Extortion group Lapsus$ claimed responsibility for a data breach at Mercor, sharing samples of stolen files, though Mercor spokesperson Heidi Hagberg declined to confirm if customer or contractor data was misused.
  • Collaborating with ransomware gangs including CipherForce and Vect, TeamPCP is leveraging access to leak data and extort victims, with researchers warning these groups are "exceptionally aggressive with their extortion.
Insights by Ground AI
Podcasts & Opinions

28 Articles

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • 83% of the sources are Center
83% Center

Factuality Info Icon

To view factuality data please Upgrade to Premium

Ownership

Info Icon

To view ownership data please Upgrade to Vantage

The Hacker News broke the news in on Monday, March 23, 2026.
Too Big Arrow Icon
Sources are mostly out of (0)

Similar News Topics

News
Feed Dots Icon
For You
Search Icon
Search
Blindspot LogoBlindspotLocal