Firewall integrations

Fortinet

Elevate the power of your Fortinet Fortigate Firewall using by adding our Intelligence.

Palo Alto

Palo Alto Firewalls can be hardened with our threat intelligence as well.

Sophos XGS

Enhance the Sophos XGS Firewall with our threat intelligence.

OPNsense

Enhance your OPNsense Firewall with our threat intelligence using the native plugin.

SIEM integrations

Splunk

Splunk is a great platform, but without the right Threat Intelligence it's just a log server. Try our threat intelligence today. 

Microsoft Sentinel

One of the most used SIEM solutions should be enriched with the right Intelligence. At Q-Feeds you're at the right place!

Other

Luckily there are many other SIEM vendors whom support 3rd party threat intelligence.

Threat Intelligence Portal

Darkweb Monitoring

Darkweb monitoring is one of our services, not only for threat intelligence but also for you most important assets.

Threat Lookup

With Threat Lookup you get full insights in our IOC database, including full MITRE ATT&K mapping.

External Attack Surface Management

A toolset to check your external facing assets exposed on the internet

Vulnerability Scanner

A comprehensive vulnerability scanner which can scan your infrastructure and web applications

Brand Protection

Protect your brand for look-a-likes and potential phishing attempts

Services

TAXII Feeds & Server Software

TAXII/STIX2.1 standard. Both in form of feeds and server software available

Implementation

Need help with implementations? No worries, we have a strong network of partners who are able to help you.

Solutions

Enrich my SIEM

Elevate the power of your SIEM solution using by adding our Intelligence.

Enrich my Firewall

Firewalls can be hardened with our threat intelligence as well.

Prevent phishing

Enhance your protection against phishing

Achieve compliancy

Achieve compliancy by correlating the best threat intelligence to your logs

Futuristic eye design with circuits and geometric shapes.

Company

About

Read here all about Q-Feeds

News and Updates

Cybersecurity news and updates about us

Publications

All of our media coverage in one place

Become a reseller

Strengthen your portfolio with our comprehensive reseller program

Partner locator

Find our certified partners here

Contact

For all your questions or inquiries

Neural network representation of a human brain

Support

My Account

Access your account and manage your licenses

Downloads & Manuals

On this page you find white papers and manuals

Knowledge base

Our knowledge base full of implementation instructions

Start for free

Start your cyber security intelligence journey here

Abstract geometric wireframe human head

Understanding the threats posed by the LiteLLM AI gateway compromise

Mar 27, 2026 | Threat Intelligence Research

Supply Chain Attack Targets Python Library LiteLLM

A recent analysis by Kaspersky highlights a supply chain attack that impacted the Python library LiteLLM, inflicting risks on numerous infrastructure components. The attackers exploited vulnerabilities within this widely used library, injecting malicious code that has significant implications for developers and their systems.

The attack occurred in March 2026, where malicious versions of LiteLLM were uploaded to the PyPI repository. Infected versions (1.82.7 and 1.82.8) implemented different methods for executing malicious scripts. Notably, the malware’s behavior was geared toward extracting sensitive data from various systems—specifically targeting AWS metadata, Kubernetes configurations, and database credentials. The technical analysis outlined a complex multi-stage attack that allowed attackers to bypass security mechanisms and establish persistent backdoors within Kubernetes clusters.

One of the more concerning elements is the malware’s integration with cloud infrastructure via the AWS Instance Metadata Service. This suggests that even systems with robust security measures could be at risk if they utilize vulnerable libraries. Infected scripts sought out not just files on the disk but also targeted dynamic secrets provided by cloud services, showcasing the sophistication of this threat.

Defensive Context

Organizations relying on widely-used open-source libraries such as LiteLLM must be acutely aware of the risks associated with supply chain attacks. This is particularly relevant for businesses that integrate these libraries within their critical infrastructure, as attackers can exploit any vulnerable components to gain access to sensitive data and configurations.

Why This Matters

The threat posed by this attack affects developers and companies using LiteLLM and similar libraries, especially within sectors heavily dependent on cloud services and containerization technologies like Kubernetes. Organizations handling confidential data must prioritize understanding how this threat could impact their infrastructure.

Defender Considerations

Defensive measures are crucial for mitigating risks associated with malicious library injections. Entities should monitor their dependencies for compromised versions in online repositories. While the analyzed library versions have been removed, organizations must still assess any prior usage of these versions and consider rotating relevant credentials, such as API keys and database passwords. Furthermore, detection strategies should include checking filesystem changes for unauthorized scripts or services, particularly in Kubernetes environments.

Indicators of Compromise (IOCs)

  • Malicious URLs:

    • models.litellm.cloud
    • checkmarx.zone
  • Infected Packages:

    • MD5 hashes for compromised versions include:
      • 85ED77A21B88CAE721F369FA6B7BBBA3
      • 2E3A4412A7A487B32C5715167C755D08
      • 0FCCC8E3A03896F45726203074AE225D
  • Malicious Scripts:

    • Hashes for scripts associated with the attack:
      • F5560871F6002982A6A2CC0B3EE739F7
      • CDE4951BEE7E28AC8A29D33D34A41AE5
      • 05BACBE163EF0393C2416CBD05E45E74

Click here for the full article

Try our Intelligence today!

Streamline your security operations with a free Q-Feeds trial and see the difference.

Other articles