Forwarded from International Cyber Digest
π¨βΌοΈ BREAKING: Crunchyroll breached through outsourcing partner in India.
A threat actor exfiltrated data from Crunchyroll's ticketing system and also managed to pull 100 GB of personally identifiable customer analytics data.
We've analyzed sample data and it includes IP addresses, email addresses, credit card details, and more.
An employee of their outsourcing partner Telus had executed malware on his system, which gave a threat actor access to Crunchyroll's environment.
The threat actor told us the breach happened on March 12, 2026. Crunchyroll revoked their access after 24 hours.
They also said Crunchyroll is ignoring all messages and still hasn't publicly disclosed the breach.
A threat actor exfiltrated data from Crunchyroll's ticketing system and also managed to pull 100 GB of personally identifiable customer analytics data.
We've analyzed sample data and it includes IP addresses, email addresses, credit card details, and more.
An employee of their outsourcing partner Telus had executed malware on his system, which gave a threat actor access to Crunchyroll's environment.
The threat actor told us the breach happened on March 12, 2026. Crunchyroll revoked their access after 24 hours.
They also said Crunchyroll is ignoring all messages and still hasn't publicly disclosed the breach.
π€£112π₯59π±19β€9π₯°6π€6π«‘3π1π’1
Leonid Radvinsky, founder of MyFreeCams and majority owner of OnlyFans, has died of cancer.
π237π«‘75π€£39π’18β€9π8π6π₯°2π±2π₯1
Hello,
Thank you to the many people who have given me malware to poke with a stick. Unfortunately right now I am extremely busy with a one year old and my work-work.
Between juggling a big stinky baby, my many malware development and research projects, work-work, malware archive stuff, and people requests to bonk stuff with a big stick, I am busy and with very limited time.
I will get around to stuff eventually... or I won't, I don't know. Whatever.
Pic unrelated
Thank you to the many people who have given me malware to poke with a stick. Unfortunately right now I am extremely busy with a one year old and my work-work.
Between juggling a big stinky baby, my many malware development and research projects, work-work, malware archive stuff, and people requests to bonk stuff with a big stick, I am busy and with very limited time.
I will get around to stuff eventually... or I won't, I don't know. Whatever.
Pic unrelated
β€94π5π―4π€£3π₯°2π€1
This media is not supported in your browser
VIEW IN TELEGRAM
> be cow
> cow, but online
> IoT? IoC
> Internet of Cow
> no security
> cows compromised
> cow botnet
> use cows for ddos attacks
> critical infrastructure taken down by cows
> hijack cow sensor
> tell cows to attack at dawn
> open front door
> 1000 cows pooping outside house
> cow, but online
> IoT? IoC
> Internet of Cow
> no security
> cows compromised
> cow botnet
> use cows for ddos attacks
> critical infrastructure taken down by cows
> hijack cow sensor
> tell cows to attack at dawn
> open front door
> 1000 cows pooping outside house
π158π€£34π₯°16π5β€4π₯4π3π3π€2
Yesterday the United States government banned all non-US produced computer networking equipment from the United States over security concerns.
Network stuff currently in use can stay, however moving forward they must be produced in the United States or be given special approval ... or stop selling in the United States.
Network stuff currently in use can stay, however moving forward they must be produced in the United States or be given special approval ... or stop selling in the United States.
π€£113π€―18π₯°12π8β€3π2π«‘2
vx-underground
Yesterday the United States government banned all non-US produced computer networking equipment from the United States over security concerns. Network stuff currently in use can stay, however moving forward they must be produced in the United States or beβ¦
The Verge
The US government just banned consumer routers made outside the US
You can keep using your existing router.
π₯°40π€£25π13π’6β€4π₯1
Whoa whoa whoa. Everyone CLAM down for a second.
Earlier today someone broke the news that there was a supply chain attack impacting LiteLLM which had over 97 MILLION installs. Initially it was reported the payload was vibe coded which resulted in the payload failing.
HOWEVER, this has been determined to be NOT TRUE. The payload was a SUCCESS. The payload failed in specific edge cases (currently unknown). The Threat Actor(s) managed to exfiltrate data from 500,000 infected machines (approx. 300gb of data).
I have confirmed this from three different sources. The initially news which is spreading all over social media is incorrect and this is actually a very big bamboozle.
They had one short, one opportunity, and did indeed seize it (but only failing in specific and unknown edge cases).
It's all over for LLM-dependency nerds. Also, in a bit of irony, LiteLLM is SOC2 certified by Delve.
This is very big shenanigans for a Tuesday.
Earlier today someone broke the news that there was a supply chain attack impacting LiteLLM which had over 97 MILLION installs. Initially it was reported the payload was vibe coded which resulted in the payload failing.
HOWEVER, this has been determined to be NOT TRUE. The payload was a SUCCESS. The payload failed in specific edge cases (currently unknown). The Threat Actor(s) managed to exfiltrate data from 500,000 infected machines (approx. 300gb of data).
I have confirmed this from three different sources. The initially news which is spreading all over social media is incorrect and this is actually a very big bamboozle.
They had one short, one opportunity, and did indeed seize it (but only failing in specific and unknown edge cases).
It's all over for LLM-dependency nerds. Also, in a bit of irony, LiteLLM is SOC2 certified by Delve.
This is very big shenanigans for a Tuesday.
β€54π€16π€£14π«‘8π₯5π±2π1π₯°1π1
vx-underground
Whoa whoa whoa. Everyone CLAM down for a second. Earlier today someone broke the news that there was a supply chain attack impacting LiteLLM which had over 97 MILLION installs. Initially it was reported the payload was vibe coded which resulted in the payloadβ¦
> malware analyst goes on x
> says supply chain attack failed
> everyone calms down
> supply chain was actually a success
> panic intensified by 150%
> says supply chain attack failed
> everyone calms down
> supply chain was actually a success
> panic intensified by 150%
π€£88π«‘9π7β€3π€3π±2π₯°1
Chat, I'll tell you one thing right now, this LiteLLM supply-chain attack is one big stinky mess.
No information has been released publicly (yet) on vendors impacted, but the stink I've been sniffing suggests this is very serious shenanigans and DFIR nerds are not happy
No information has been released publicly (yet) on vendors impacted, but the stink I've been sniffing suggests this is very serious shenanigans and DFIR nerds are not happy
π€59π12π«‘10β€3π3π₯°1
People asking me for the anime lore on this LiteLLM compromise.
I'll do it tomorrow. It's got some filler episodes, but they're still lowkey important for later references.
The first episode is kind of cool, it slows down, but then toward the end of the anime it gets crazy.
In extreme summary, nerds compromised a thingie, used it to compromise other thingies, used that to compromise other thingies, then did the big thingie with LiteLLM
It's a big cluster fuck because now you're like, what did they steal? Do they have access to anything else? How long is season 1 of this anime? It's wild stuff
I'll do it tomorrow. It's got some filler episodes, but they're still lowkey important for later references.
The first episode is kind of cool, it slows down, but then toward the end of the anime it gets crazy.
In extreme summary, nerds compromised a thingie, used it to compromise other thingies, used that to compromise other thingies, then did the big thingie with LiteLLM
It's a big cluster fuck because now you're like, what did they steal? Do they have access to anything else? How long is season 1 of this anime? It's wild stuff
π₯°39β€17π₯12π6
The LiteLLM supply chain attack is big shenanigans. I have to explain the whole thingie though so you can get the full context of the shenanigans. TeamPCP (the people who probably did it) is unironically swinging a big ass fuck off baseball bat, they're swinging for the moon.
tl;dr see picture of cat as summary
I also want to preface this with I DID NOT PERFORM THIS ANALYSIS. I almost never do open-source solutions malware stuff and this is also more in the line of work with DFIR (Digital Forensics and Incident Response). This summary comes from various peers and colleagues of mine who have been discussing TeamPCP the past couple of days.
DFIR nerds I sourced:
- ramimacisabird
- InsiderPhD
Non DFIR nerds I sourced:
- IceSolst
- IntCyberDigest
Yeah, so pretty much this group of nerds named TeamPCP bamboozled an open-source security product called Trivy. TeamPCP sent a pull request on GitHub but did it with "pull_request_target".
Normally a pull request isn't a big deal. Nerds do it all the time. "pull_request_target" though is designed to copy secrets, tokens, etc. pull_request_target is a legit thing. People do it all the time. It should only be performed by people you trust. TeamPCP impersonated a legitimate GitHub contributor.
Trivy was caught slippin'. When TeamPCP did pull_request_target they stole access tokens to a place called Aqua Security.
Aqua Security was like, "lol gosh dang it" and did what you were supposed to do. They rotated access tokens and passwords and stuff. However, Aqua made an oopsie and forgot to rotate the stuff for one of their automation bots.
Once TeamPCP had access they injected malicious code which steal environment variables, SSH keys, cloud credentials, cryptotokens, etc into three things.
- Trivy
- Trivy GitHub actions
- Trivy Docker stuff
As is tradition, once TeamPCP put malware into Trivy stuff, anyone who did anything with Trivy was given malware. TeamPCP got a metric poop ton of stolen data and began using it to move to NPM projects. The projects they infected next was infected with a malware people named "CanisterWorm".
In extreme summary, CanisterWorm placed stuff in package.json from the infected NPM project. Every new infected NPM project would download malware to the machine that (unsurprisingly) stole your data.
TeamPCP seems to have been inspired by the North Korean government, or ALPHV ransomware group, because instead of stealing data to their server they store it on the blockchain ... making it virtually impossible to takedown.
LiteLLM takes place somewhere between Trivy and CanisterWorm. As of this writing the exact way TeamPCP got access to LiteLLM is unknown, however it's heavily speculated it is from Trivy. TeamPCP also stated very bluntly they got access from Trivy but ... they could also be lying. This may come as a surprise, but sometimes criminals lie to cover their tracks.
LiteLLM infection though was a few more degrees amplified than the previous stuff. LiteLLM infection also attempts lateral movement by automating Kubernetes stuff. LiteLLM infection also steals a ton more data than previous stuff. Here is the big ass list of stuff it steals:
- SSH keys
- AWS credentials and configurations
- GCP credentials and configurations
- Azure environment variables
- Kubernetes credentials and configurations
- Environment configurations
- Shell History
- Git credentials and configurations
- Docker credentials and configurations
- Database instances
- IaC / CI/DI
- SSL private keys
- Solana keys
- Crypto wallets
- VPN credentials and configurations
- Hashicorp vault (?)
- NPM configurations
- SMTP credentials
TeamPCP is unironically putting in big moves. What makes them unusual is how profoundly aggressive they are. It isn't uncommon for Threat Actors to attempt things like this, but TeamPCP is doing something more akin to "smash and grab" rather than "stay silent and watch".
tl;dr see picture of cat as summary
I also want to preface this with I DID NOT PERFORM THIS ANALYSIS. I almost never do open-source solutions malware stuff and this is also more in the line of work with DFIR (Digital Forensics and Incident Response). This summary comes from various peers and colleagues of mine who have been discussing TeamPCP the past couple of days.
DFIR nerds I sourced:
- ramimacisabird
- InsiderPhD
Non DFIR nerds I sourced:
- IceSolst
- IntCyberDigest
Yeah, so pretty much this group of nerds named TeamPCP bamboozled an open-source security product called Trivy. TeamPCP sent a pull request on GitHub but did it with "pull_request_target".
Normally a pull request isn't a big deal. Nerds do it all the time. "pull_request_target" though is designed to copy secrets, tokens, etc. pull_request_target is a legit thing. People do it all the time. It should only be performed by people you trust. TeamPCP impersonated a legitimate GitHub contributor.
Trivy was caught slippin'. When TeamPCP did pull_request_target they stole access tokens to a place called Aqua Security.
Aqua Security was like, "lol gosh dang it" and did what you were supposed to do. They rotated access tokens and passwords and stuff. However, Aqua made an oopsie and forgot to rotate the stuff for one of their automation bots.
Once TeamPCP had access they injected malicious code which steal environment variables, SSH keys, cloud credentials, cryptotokens, etc into three things.
- Trivy
- Trivy GitHub actions
- Trivy Docker stuff
As is tradition, once TeamPCP put malware into Trivy stuff, anyone who did anything with Trivy was given malware. TeamPCP got a metric poop ton of stolen data and began using it to move to NPM projects. The projects they infected next was infected with a malware people named "CanisterWorm".
In extreme summary, CanisterWorm placed stuff in package.json from the infected NPM project. Every new infected NPM project would download malware to the machine that (unsurprisingly) stole your data.
TeamPCP seems to have been inspired by the North Korean government, or ALPHV ransomware group, because instead of stealing data to their server they store it on the blockchain ... making it virtually impossible to takedown.
LiteLLM takes place somewhere between Trivy and CanisterWorm. As of this writing the exact way TeamPCP got access to LiteLLM is unknown, however it's heavily speculated it is from Trivy. TeamPCP also stated very bluntly they got access from Trivy but ... they could also be lying. This may come as a surprise, but sometimes criminals lie to cover their tracks.
LiteLLM infection though was a few more degrees amplified than the previous stuff. LiteLLM infection also attempts lateral movement by automating Kubernetes stuff. LiteLLM infection also steals a ton more data than previous stuff. Here is the big ass list of stuff it steals:
- SSH keys
- AWS credentials and configurations
- GCP credentials and configurations
- Azure environment variables
- Kubernetes credentials and configurations
- Environment configurations
- Shell History
- Git credentials and configurations
- Docker credentials and configurations
- Database instances
- IaC / CI/DI
- SSL private keys
- Solana keys
- Crypto wallets
- VPN credentials and configurations
- Hashicorp vault (?)
- NPM configurations
- SMTP credentials
TeamPCP is unironically putting in big moves. What makes them unusual is how profoundly aggressive they are. It isn't uncommon for Threat Actors to attempt things like this, but TeamPCP is doing something more akin to "smash and grab" rather than "stay silent and watch".
π₯°25β€13π₯7π±3
vx-underground
The LiteLLM supply chain attack is big shenanigans. I have to explain the whole thingie though so you can get the full context of the shenanigans. TeamPCP (the people who probably did it) is unironically swinging a big ass fuck off baseball bat, they're swingingβ¦
tl;dr
β€42π₯°12π₯5π2
Someone also made a video if you're lazy and don't want to read
https://www.youtube.com/watch?v=i9o4aWxAnLk
https://www.youtube.com/watch?v=i9o4aWxAnLk
YouTube
LiteLLM hack: Big brain target for hackers
LiteLLM hack summary: What is it, why it's smart to target it, and how it happened (so far).
GitHub Issue: https://github.com/BerriAI/litellm/issues/24512
Thread on cursed orange site: https://news.ycombinator.com/item?id=47501729
Original blog post: β¦
GitHub Issue: https://github.com/BerriAI/litellm/issues/24512
Thread on cursed orange site: https://news.ycombinator.com/item?id=47501729
Original blog post: β¦
π₯°13π5β€4
vx-underground
> threat actors > big mean nerds > perform massive supply chain attack > infect potentially millions of devices > appears to be pivoting to extortion > identify victim as veterinary software > sends email to victims > "lol sorry"
"listen bro, well perform a massive supply chain attack, commit millions of dollars of aggravated identity theft, extortion, violations of CFAA (computer fraud and abuse act), perform millions of dollars of indirect damage, but we WILL NOT prevent that yorkshire terrier from getting a cancer screening. thats fucked up" - threat actors (probably)
π«‘51π€£14π₯°10β€6
vx-underground
> threat actors > big mean nerds > perform massive supply chain attack > infect potentially millions of devices > appears to be pivoting to extortion > identify victim as veterinary software > sends email to victims > "lol sorry"
Nobody tell TeamPCP they've made a mistake and PetScreening is actually software designed for landlords.
PetScreening does background checks on animals to ensure they're actually service animals and to help landlords generate "opportunities for pet-related revenue".
This is not for cancer screenings.
This is very silly shenanigans.
PetScreening does background checks on animals to ensure they're actually service animals and to help landlords generate "opportunities for pet-related revenue".
This is not for cancer screenings.
This is very silly shenanigans.
π€£31π’13β€4π1
vx-underground
Nobody tell TeamPCP they've made a mistake and PetScreening is actually software designed for landlords. PetScreening does background checks on animals to ensure they're actually service animals and to help landlords generate "opportunities for pet-relatedβ¦
I unironically assumed it was for cancer screenings too based off the domain name and only took a quick glance at the website. I didn't even read it.
Big Wednesday shenanigans
Big Wednesday shenanigans
β€14π€£7π2π₯°2π1π€©1