đ± 4-TB Heist in 3 Hours: Mercor AI Supply-Chain Pillaged via Poisoned LiteLLM
TL;DR
- Mercor AI Breached via Poisoned Python Package, Exposing 211GB of Candidate Data
- NoVice malware infects 2.3M Android devices via 50+ Google Play apps, persists after factory reset via kernel and Mali GPU exploits
- HasBro Discloses Cybersecurity Incident, SEC Files 8-K Amid Ongoing Forensic Investigation
đ± 4-TB Heist in 3 Hours: Mercor AI Supply-Chain Pillaged via Poisoned LiteLLM
4 TB gutted in 3 hâlike cramming the Library of Congress through a drinking straw đ± Mercorâs CI just pip-installed its own obituary. Your resumĂ© & face-vid? Now Lapsus$ binge-watch material. Still trusting âlatestâ tags, SF? â howâs that $10 B pillow taste?
Welcome to the PyPI slaughterhouse, where your rĂ©sumĂ©, passport scan, and that awkward 3-TB video of you explaining âyour biggest weaknessâ just became free torrent fodder. Mercor AI, the SF-based hiring-bot darling, got drop-kicked by a poisoned LiteLLM package so small it could fit on a floppyâif anyone still remembered what those were.
How the sausage got poisoned
- 12 Mar: Trivyâs CI repo left the door open with a
pull_request_targettoken that might as well have been a neon âFREE BEERâ sign. - 19 Mar: Token used to yoink PyPI publishing rights for LiteLLMâno MFA, no signature, no problem.
- 24 Mar 10:39 UTC: Malicious versions 1.82.7 & 1.83.8 land on PyPI.
- 10:45 UTC: Mercorâs CI slurps them straight into prodâno hash check, no sandbox, no f***s given.
- 13:30 UTC: 200 Mbps exfil via Tailscale VPN to
models.litellm.cloud; 4 TB later, Lapsus$ drops the mic.
Impact in bite-size blood splatters
Candidates: 211 GB of PII â GDPR/CCPA fines up to 4 % of global revenue â every applicant now phishing bait.
Ops: SSH/AWS keys stolen â 2 M USD daily payout pipeline one ssh-away from âsudo rm -rf /â.
Ecosystem: LiteLLM downloaded 3.4 M times/day â 2 337 downstream libs now wondering if theyâre next.
Valuation: $10 B paper-unicorn looking at a 10â15 % haircut because âtrustâ isnât in the VCsâ dictionary.
Institutional responseâaka the usual fire drill
Mercor rotated every token in sight, slapped Sigstore signatures on future builds, and hired a forensics firm to bill 1 k USD/hour for saying âyou got pwned.â PyPI promises mandatory 2FAâsometime before the heat death of the universe. FBI & CISA nod solemnly, then go back to their own unpatched Jenkins boxes.
Timeline of âlessons learnedâ (spoiler: nobody learns)
- Q2 2026: Mercor usage dips 20 %; legal war-chest burns 50 M USD.
- Q4 2026: PyPI 2FA still ârolling outâ; 30 % YoY rise in CI/CD supply-chain carnage.
- 2027: Recruitment-tech sector down 15 %; class-action sharks circle; Sigstore becomes the new checkbox nobody audits.
Cheatsheet for the broke and the paranoid
- Pin hashes, sign commits, rotate tokens monthlyâcheap, boring, effective.
- Kill
pull_request_targetwith fire; run CI in throwaway containers. - Segment VPN egress; if it canât phone home, it canât leak 3 TB of your cringe interview.
- Budget 0 USD: TruffleHog, Cosign, open-source SBOM toolsâstill better than a 80 M USD âincident response.â
Bottom line
Mercorâs meltdown isnât a bug; itâs the feature of an industry that outsources security to Markdown âbest-practiceâ docs. Until the next 34-KB gift wraps your data, keep your hashes tight, your tokens tighter, and maybeâjust maybeâdonât film your passport next to your face.
đ± 2.5M Midwest Androids Hijacked: Rootkit Survives Factory Reset
2.5 M phones gutted by 22 crusty exploits & a factory reset WONâT kill it đ± Thatâs every adult in Kansas wiretapped forever. WhatsApp/Signal jacked, reboot-loop booby-trappedâonly a full firmware reflash pays the ransom. Own an old budget Android? Congrats, youâre the product â time to torch it or flash it?
McAfeeâs Easter âsurpriseâ: 50 cute Play Store trinketsâcleaners, candy-crush clones, gallery appsâshipped with a stowaway rootkit that hijacks 2016-21 kernel/Mali GPU bugs, ramrods itself into read-only system partitions, and auto-resurrects every 60 seconds.
Result: 2.3 million cheap Androids are now Eternal Wiretapsâą that survive wipes, boot loops, and your naĂŻve hope that âoff-brand phoneâ equals âlow-risk phone.â
How it burrows
- 22 exploits (16 kernel + GPU use-after-free chain) â disables SELinux â swaps core runtime libs â drops âOmegaâ daemon â overwrites crash handler so a reset just re-invites the parasite.
- Fallback images live on /systemâOEM-signed, untouchable without a full firmware re-flash.
- C2 pings once a minute, slurping WhatsApp tokens, Signal keys, contacts, even your dusty Google Drive backups.
Impactsâparallel pain edition
Privacy: full chat DB cloned â blackmail buffet, corporate leaks, drunk-text archaeology.
Wallet: only fix is a PC-grade reflash â casual users pay repair shops â$60â100 or buy a new burner.
Stability: reset triggers reboot loops; bricked phones pile up in Midwest drawers next to AOL CDs.
Trust: Google Play looked the other way for two years; devs banned after headlines, not before.
Response & gaps
Google yanked the apps, sent âthoughts & prayersâ security note. OEMs mumble âpatch level 2021-06 or later,â ignoring that 40% of target regions never see an OTA. McAfee teases a free scrubberâsometime. Meanwhile, NoVice keeps dialing home.
Timeline of (maybe) caring
- Q2 2026: phishing wave masquerades as âNoVice removerâ appsâinfections rebound 15%.
- Q3 2026: Samsung/Xiaomi push mandatory integrity check for system libs; rootkit adoption capped at current 2.3 M.
- 2027: copycat kits pivot to newer Adreno/Radeon zero-days; problem migrates to freshly patched flagshipsâbudget users still screwed.
Bottom line
Your data is the product, your $120 phone is the joke, and factory reset is just the malwareâs snooze button. Want privacy? Grab an open-source ROM, a cable, and the guts to void your warrantyâbecause the Play Store wonât save you, and corporate PR sure as hell wonât either.
đ„ $4.7B Hasbro Offline: 3.2 TB Logs, 12 Hosts Compromised, Orders Delayed 7 Days
$4.7B toy titan Hasbro just got pwnedâ3.2 TB of logs, 12 hosts 0wned, e-commerce still on ice đ§đ„ Thatâs 15-25 % slower Monopoly money while the hackers camp inside like itâs free parking. Gamers & toy hoardersâhow long till your pre-order ships?
Hasbro woke up Monday with a hangover and a ransom note. By Friday the companyâs still playing whack-a-mole inside its own network while telling the SEC, âYeah, somethingâs borked, details later.â Cue 8-K filing, 5,000 workers on duct-taped laptops, and your pre-order for a $250 Optimus Prime stuck in cyber-limbo.
How the hell did a toy giant step on this rake?
- 27 Mar: logs burp anomalies
- 28 Mar: intruder waltzes through 12 hosts before anyone yanks the cable
- 30 Mar: e-commerce, ERP, design vaultsâall darkâ3.2 TB of logs now bedtime reading for forensics nerds
- 02 Apr: SEC gets the postcard (âIncident? Check. Data gone? Maybe. Weâll ping ya.â)
- Today: attackers still ghosting around like unpaid interns
Impact, translated for humans
Shipping: 7-day delays â your nieceâs birthday morphs into tearful meltdown.
Money: breach averages $4.4 M; Hasbro just set aside $10 M for lawyer happy-hour.
Secrets: Monopoly money prints, Transformers CAD files, and every Planeswalkerâs DCI numberâfloating in the void.
Fines: up to $1 M per state if they snail-mail breach letters; EU can slap on extra GDPR spice.
Whatâs the grown-up response?
- VLAN moats, MFA blitz, SharePoint patch for CVE-2026-21536âcheck, check, check
- Brand comms stuck in âmumâ until forensics proves which data got mugged
- Budget bump 3-5 % for toys like EDR and a SOC that doesnât sleep through alarms
Timeline of dread
- 0-2 weeks: 80 % of orders limp along; 10 % revenue dip if fix drags past fortnight
- Q2 2026: breach notices bulk-mail; regulators line up for their pound of plastic flesh
- Late-2026: if rebuild finishes, Hasbroâs cyber tab lands ~$15 M; stock shrugs if no customer data confirmed loose
Bottom line
A company that sells pretend wars just got a real oneâinside its servers. Until the forensics fairy declares the network clean, every Magic booster, Transformer, and pink Monopoly house is a maybe-breached hostage. Kids still want their toys; hackers just want the receipts.
In Other News
- Naoris Protocol Launches Post-Quantum Mainnet, Processes 106M Transactions with Quantum-Resistant Crypto
- Gardyn Home Kit IoT Devices Exposed 138,000 User Records Due to Unauthenticated API Endpoints
Comments ()