Startups
Mercor’s Cyberattack: The Fallout of the Open-Source LiteLLM Project Compromise
Mercor Confirms Security Incident Linked to Supply Chain Attack
Mercor, a prominent AI recruiting startup, has verified a security breach associated with a supply chain attack involving the open-source project LiteLLM.
The AI company informed TechCrunch that it was among the numerous organizations impacted by a recent compromise of LiteLLM’s project, which was tied to a hacking group known as TeamPCP. This confirmation comes as the extortion hacking group Lapsus$ claimed to have targeted Mercor and gained access to its data.
The specific method through which the Lapsus$ group obtained the stolen data from Mercor as part of TeamPCP’s cyberattack remains unclear.
Established in 2023, Mercor collaborates with companies like OpenAI and Anthropic to train AI models by enlisting specialized domain experts from markets such as India. The startup facilitates over $2 million in daily payouts and received a valuation of $10 billion post a $350 million Series C round led by Felicis Ventures in October 2025.
Heidi Hagberg, a spokesperson for Mercor, confirmed that the company promptly took action to contain and address the security incident.
Hagberg stated, “We are currently conducting a comprehensive investigation with the support of leading third-party forensics experts. We will maintain direct communication with our customers and contractors and allocate necessary resources to resolve the issue swiftly.”
Earlier, Lapsus$ took credit for the alleged data breach on its leak site and shared a data sample supposedly taken from Mercor, containing references to Slack data, ticketing information, and videos of interactions between Mercor’s AI systems and contractors.
TechCrunch Event
San Francisco, CA
|
October 13-15, 2026
Hagberg declined to respond to further inquiries regarding the connection to Lapsus$’ claims or whether any customer or contractor data had been compromised, accessed, or misused.
The LiteLLM compromise came to light after malicious code was detected in a package related to the Y Combinator-backed startup’s open-source project. Despite swift removal of the code, the incident raised concerns due to LiteLLM’s extensive usage on the internet, with millions of daily downloads, according to security firm Snyk. This event prompted LiteLLM to improve its compliance procedures by transitioning from Delve to Vanta for certification.
The extent of companies affected by the LiteLLM incident and the possibility of data exposure remain uncertain as investigations progress.
-
Facebook5 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook6 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook6 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook4 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook4 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook6 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook4 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple5 months agoMeta discontinues Messenger apps for Windows and macOS

