Mercor表示其遭受网络攻击,与LiteLLM被攻破有关。
Mercor says it was hit by cyberattack tied to compromise LiteLLM

原始链接: https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/

AI招聘初创公司Mercor已确认一起安全事件,源于针对开源项目LiteLLM的供应链攻击,该项目被黑客组织TeamPCP入侵。勒索组织Lapsus$声称对入侵Mercor并访问数据负责,但与LiteLLM攻击的关联仍在调查中。 估值100亿美元的Mercor每天促成超过200万美元的AI领域专家付款,并与OpenAI和Anthropic等公司合作。该公司表示已迅速采取行动控制漏洞,并正在进行法医调查。 Lapsus$分享了一份据称被盗数据的样本——包括Slack和工单信息,以及AI承包商互动的录音——但Mercor尚未确认客户或承包商数据是否受到损害。上周发现的LiteLLM最初的漏洞促使该项目加强其安全合规流程。受影响的公司范围以及任何数据泄露情况仍不清楚。

## Mercor 网络攻击与安全讨论 - 总结 Mercor,一家人工智能公司,最近遭受了一次与 LiteLLM 漏洞相关的网络攻击。该事件促使 LiteLLM 将合规认证提供商从 Delve 切换至 Vanta。此事引发了 Hacker News 上关于 SOC2 和 ISO27001 等安全认证的价值和局限性的热烈讨论。 许多评论员认为这些认证往往是“安全秀”,侧重于合规和文档,而非真正的安全能力。虽然并非无用——它们可以推动必要的流程改进并证明安全支出的合理性——但它们并非万无一失。一些人将其比作 FAA 认证,为供应商提供责任转移框架。 对话还涉及沙箱技术,特别是 Docker,并就其作为安全边界的有效性进行了辩论。人们对错误配置会抵消其优势表示担忧,而另一些人则认为它比没有沙箱更好。此次攻击还凸显了供应链安全和 CI/CD 管道监控的重要性。最终,共识倾向于主动安全措施,以及关注真正重视安全的组织。
相关文章

原文

Mercor, a popular AI recruiting startup, has confirmed a security incident linked to a supply chain attack involving the open source project LiteLLM.

The AI startup told TechCrunch on Tuesday that it was “one of thousands of companies” affected by a recent compromise of LiteLLM’s project, which was linked to a hacking group called TeamPCP. Confirmation of the incident comes as extortion hacking group Lapsus$ claimed it had targeted Mercor and gained access to its data.

It’s not immediately clear how the Lapsus$ gang obtained the stolen data from Mercor as part of TeamPCP’s cyberattack.

Founded in 2023, Mercor works with companies, including OpenAI and Anthropic, to train AI models by contracting specialized domain experts such as scientists, doctors, and lawyers from markets, including India. The startup says it facilitates more than $2 million in daily payouts and was valued at $10 billion following a $350 million Series C round led by Felicis Ventures in October 2025.

Mercor spokesperson Heidi Hagberg confirmed to TechCrunch that the company had “moved promptly” to contain and remediate the security incident.

“We are conducting a thorough investigation supported by leading third-party forensics experts,” said Hagberg. “We will continue to communicate with our customers and contractors directly as appropriate and devote the resources necessary to resolving the matter as soon as possible.”

Earlier, Lapsus$ claimed responsibility for the apparent data breach on its leak site and shared a sample of data allegedly taken from Mercor, which TechCrunch reviewed. The sample included material referencing Slack data and what appeared to be ticketing data, as well as two videos purportedly showing conversations between Mercor’s AI systems and contractors on its platform.

Techcrunch event

San Francisco, CA | October 13-15, 2026

Hagberg declined to answer follow-up questions on whether the incident was connected to claims by Lapsus$, or whether any customer or contractor data had been accessed, exfiltrated, or misused.

The compromise of LiteLLM originally surfaced last week after malicious code was discovered in a package associated with the Y Combinator-backed startup’s open source project. While the malicious code was identified and removed within hours, the incident drew scrutiny due to LiteLLM’s widespread use around the internet, with the library downloaded millions of times per day, per security firm Snyk. The incident also prompted LiteLLM to make changes to its compliance processes, including shifting from controversial startup Delve to Vanta for compliance certifications.

It remains unclear how many companies were affected by the LiteLLM-related incident or whether any data exposure occurred, as investigations continue.

联系我们 contact @ memedata.com