Iran Hits AWS/Azure as LiteLLM Backdoor Steals Cloud Keys
Topics AI Regulation · AI Capital · Data Infrastructure
Iran has physically struck AWS and Azure cloud data centers in the Middle East and named 18 US tech companies for imminent targeting — while LiteLLM (97M monthly PyPI installs), the most popular open-source LLM proxy, was simultaneously backdoored with a credential harvester exfiltrating AWS/GCP/Azure keys, K8s configs, and every LLM API key in your stack. Your cloud dependencies are under kinetic and software supply chain attack at the same time. Validate Middle East region failover today. Audit every environment for LiteLLM now — if it was installed during the 3-hour compromise window, rotate every secret it ever touched.
◆ INTELLIGENCE MAP
01 Iran Crosses Kinetic Threshold Against US Cloud Infrastructure
act nowIran struck AWS and Azure facilities in the Middle East and publicly named 18 US tech companies as future targets. IRGC declared retaliatory doctrine: 'for every assassination, an American company will be destroyed.' Gray Sandstorm is password-spraying M365 tenants to support Bombing Damage Assessment for kinetic strikes.
- Providers struck
- Escalation date
- Sectors targeted
- Doctrine trigger
- 01AWS (Bahrain)Struck
- 02Azure (UAE/Qatar)Struck
- 03Google CloudNamed
- 04Oracle CloudNamed
- 05AppleNamed
- 06NvidiaNamed
02 LiteLLM Backdoor: AI Proxy Compromise Harvests Every Cloud Credential
act nowTeamPCP backdoored LiteLLM (97M monthly PyPI installs) with a 3-stage attack: credential harvest → K8s lateral movement → systemd persistence. Targets include SSH keys, AWS/GCP/Azure creds, K8s configs, and LLM API keys. Lapsus$ claims secondary access to exfiltrated data. Mercor confirmed breached. Live for 3 hours before quarantine.
- Compromise window
- Mercor data stolen
- Attack stages
- Credential types
- Axios (npm)100
- LiteLLM (PyPI)97
03 Active Exploitation Trifecta: Fortinet EMS, Magento PolyShell, TrueConf 0-day
monitorThree concurrent critical exploits: Fortinet EMS CVE-2026-21643 (SQLi, unauthenticated takeover, patched Feb but now actively exploited), Magento PolyShell (unauthenticated web shell upload, mass exploitation at hundreds/hour), and TrueConf CVE-2026-3502 (Chinese-nexus APT zero-day pushing malicious updates to all connected clients). Patch-to-exploitation window continues collapsing.
- Fortinet patch lag
- Magento exploit rate
- TrueConf patch
- Fortinet CVE
- Feb 2026Fortinet EMS patched
- Mid-MarPolyShell disclosed
- Late MarFortinet exploitation begins
- Late MarPolyShell mass exploitation
- Apr 1TrueConf 0-day in the wild
04 Quantum ECC Break Requirements Drop 40x — PQC Migration Accelerates
monitorOratomic achieved a 40x reduction in physical qubits needed to break ECDSA secp256k1 — down to 26,000 using neutral atom methods. Google Quantum AI independently cut requirements to ~500K physical qubits via surface code. Ethereum Foundation's Justin Drake now assigns ≥10% q-day probability by 2032. Google targeting 2029 for full PQC migration.
- Oratomic qubits
- Google qubits
- Prior estimate
- Q-day probability
05 Compliance Infrastructure Erosion: Delve SOC 2 Fraud + US Army Cyber Training Cuts
backgroundYC-backed compliance startup Delve allegedly generated 494 fraudulent SOC 2 reports with fabricated evidence and pre-written conclusions — any vendor using Delve attestations may have worthless compliance posture. Separately, the US Army cut mandatory cyber training from annual to once every 5 years. Both signal systemic erosion of trust frameworks security teams rely on.
- Delve fraud reports
- Army training cut
- New frequency
- LiteLLM moved to
- Army training (old)12
- Army training (new)60
◆ DEEP DIVES
01 Iran's Kinetic-Cyber Convergence: Your Cloud Data Centers Are Now Military Targets
<h3>A New Category of Cloud Risk</h3><p>For the first time in the cloud era, a <strong>nation-state military has physically struck commercial cloud infrastructure</strong> and publicly promised more. Iran's IRGC has already hit AWS and Microsoft Azure facilities in the Middle East and announced imminent expansion to 18 named US tech companies — including Google, Oracle, Apple, Meta, and Nvidia — with strikes potentially <strong>beginning April 2</strong>.</p><p>The IRGC's statement is unambiguous: <em>"For every assassination, an American company will be destroyed."</em> This isn't a cyber threat advisory. This is a <strong>declared military doctrine targeting civilian technology infrastructure</strong>.</p><blockquote>Physical destruction of cloud regions has longer recovery timelines than ransomware — and with a 30% transformer supply deficit and 80% import dependency, damaged infrastructure may take months to rebuild.</blockquote><hr><h3>Cyber Operations Supporting Kinetic Targeting</h3><p>This isn't just bombs. Check Point researchers identified <strong>Gray Sandstorm</strong> conducting multi-wave M365 password spray campaigns across March 2026, targeting Israeli and UAE municipalities — <em>the same municipalities later hit by Iranian drone and missile strikes</em>. The assessment: these operations support <strong>Bombing Damage Assessment (BDA)</strong>. Targeted sectors include satellite, aviation, energy, and maritime.</p><p>The integration of cyber reconnaissance with kinetic strike planning represents a <strong>doctrinal evolution</strong> that most enterprise threat models don't account for. Your M365 logs may contain pre-strike indicators.</p><h3>Immediate BCP Implications</h3><table><thead><tr><th>Provider</th><th>MENA Regions</th><th>Status</th><th>Risk Level</th></tr></thead><tbody><tr><td><strong>AWS</strong></td><td>Bahrain (me-south-1)</td><td>Struck</td><td>Critical</td></tr><tr><td><strong>Azure</strong></td><td>UAE North/Central, Qatar</td><td>Struck</td><td>Critical</td></tr><tr><td><strong>Google Cloud</strong></td><td>Doha, Dammam, Tel Aviv</td><td>Named</td><td>High</td></tr><tr><td><strong>Oracle Cloud</strong></td><td>Jeddah, Abu Dhabi</td><td>Named</td><td>High</td></tr></tbody></table><p>Most enterprise BCP plans model regional outages as natural disaster scenarios. The distinction matters: <strong>targeted strikes can be repeated, escalated, and directed at specific providers</strong>. A 30-day regional outage from physical attack is a fundamentally different scenario than a multi-hour cloud service degradation. Validate your RTO/RPO assumptions against this reality.</p><h3>The Predictive Advantage</h3><p>The IRGC's retaliatory doctrine gives defenders something rare: a <strong>predictive trigger</strong>. US-Iran escalation events (assassinations, sanctions, military strikes) can be monitored as leading indicators for infrastructure targeting. Build an OSINT-driven tripwire that auto-elevates your SOC posture when geopolitical triggers fire.</p>
Action items
- Enumerate all workloads, data stores, and services in AWS me-south-1, Azure UAE/Qatar, and any MENA cloud region. Test failover to unaffected regions today.
- Run targeted threat hunt for Gray Sandstorm TTPs: password spray patterns against M365, anomalous sign-ins from Middle Eastern IP ranges, and T1110.003 indicators across Entra ID logs for the past 30 days.
- Brief executive leadership and board risk committee on kinetic cloud threats as a new BCP category requiring investment in multi-region and multi-cloud redundancy.
- Build an OSINT-driven geopolitical tripwire: monitor US-Iran escalation events and pre-define automated SOC posture changes (elevated monitoring, DR readiness checks, vendor status calls).
Sources:Axios npm compromise by DPRK, Fortinet EMS 0-day in the wild, and Iran fusing cyber ops with missile strikes · Iran struck AWS data centers and named your vendors next — 18 US tech firms now on IRGC's target list · Iran is striking your cloud regions and Anthropic just leaked 500K lines of code · Encryption ruled a 'design defect' in court — plus Iran names 18 US tech targets · Iran kinetic ops mean your SOC should be hunting for APT33/APT35 right now
02 LiteLLM Backdoor: A 3-Hour Window That May Have Exfiltrated Every Secret in Your AI Stack
<h3>The AI Toolchain's First Tier-1 Supply Chain Attack</h3><p>TeamPCP compromised <strong>LiteLLM</strong>, the most popular open-source LLM proxy with <strong>97 million monthly PyPI installs</strong>. LiteLLM sits in the data path between applications and model APIs — meaning the compromised version had access to everything flowing through it. The backdoor was live for <strong>three hours before quarantine</strong>, but the three-stage attack architecture shows this was not opportunistic.</p><h4>The Attack Chain</h4><ol><li><strong>Stage 1 — Credential Harvesting:</strong> Targeted SSH keys, AWS/GCP/Azure credentials, Kubernetes configs, crypto wallets, and LLM API keys — essentially <strong>every secret that matters in a modern cloud-native AI stack</strong></li><li><strong>Stage 2 — Kubernetes Lateral Movement:</strong> Used harvested K8s configs to move laterally across cluster infrastructure</li><li><strong>Stage 3 — Systemd Persistence:</strong> Installed a persistent backdoor that survives reboots on Linux systems</li></ol><p>Mercor has confirmed a resulting breach: <strong>939GB of source code and 4TB total data exfiltrated</strong>, reportedly via TailScale VPN compromise. Lapsus$ is now claiming secondary access to the stolen data, adding a <strong>data brokering dimension</strong> — expect public dumps or extortion attempts in coming weeks.</p><blockquote>LiteLLM processed your prompts, API keys, and model responses. If it was in your stack during the compromise window, treat every credential it touched as burned.</blockquote><hr><h3>The Delve Connection</h3><p>LiteLLM subsequently dropped <strong>Delve</strong> for <strong>Vanta</strong> as its compliance certification provider. This is significant because Delve — a YC-backed compliance startup — is separately alleged to have generated <strong>494 fraudulent SOC 2 audit reports</strong> with fabricated evidence and pre-written conclusions. If any vendor in your supply chain holds a Delve-issued SOC 2 report, that attestation may be worthless. The LiteLLM-Delve connection suggests their prior compliance posture was inadequate to detect or prevent the compromise.</p><h3>Why This Is Different From Axios</h3><p>While the Axios npm compromise (covered yesterday) affected the broadest possible JavaScript surface, LiteLLM's compromise is <strong>more dangerous per affected system</strong>. LiteLLM is a credential proxy — it doesn't just run on your machine, it <strong>routes your most sensitive API keys and business data</strong> to external providers. A compromised Axios deployment gives attackers a foothold. A compromised LiteLLM deployment gives attackers your <strong>entire AI infrastructure credential set</strong>.</p><table><thead><tr><th>Dimension</th><th>Axios</th><th>LiteLLM</th></tr></thead><tbody><tr><td><strong>Reach</strong></td><td>100M weekly npm downloads</td><td>97M monthly PyPI installs</td></tr><tr><td><strong>Data access</strong></td><td>Host-level (files, env vars)</td><td>All LLM API keys, prompts, responses</td></tr><tr><td><strong>Persistence</strong></td><td>RAT (self-destructing)</td><td>Systemd service (survives reboot)</td></tr><tr><td><strong>Attribution</strong></td><td>DPRK / UNC1069</td><td>TeamPCP / Lapsus$ secondary</td></tr><tr><td><strong>Compliance link</strong></td><td>None</td><td>Delve SOC 2 fraud connection</td></tr></tbody></table>
Action items
- Search for LiteLLM across all package manifests (requirements.txt, Docker images, Helm charts, CI/CD pipelines) immediately. If found, determine installed version and cross-reference against the compromise window.
- Rotate ALL API keys that ever transited a LiteLLM instance: OpenAI, Anthropic, Google, AWS, GCP, Azure. Revoke old keys — don't just add new ones. Audit K8s cluster access logs for unauthorized lateral movement.
- Audit systemd unit files on all Linux systems that had LiteLLM installed. Hunt for unauthorized services designed to survive reboots.
- Identify all vendors in your supply chain holding Delve-issued SOC 2 reports. Flag as potentially fraudulent. Request re-audit from a recognized firm.
- Send targeted vendor risk questionnaire to all AI-adjacent vendors asking specifically about LiteLLM usage, LLM proxy architecture, and supply chain security controls for open-source AI dependencies.
Sources:Your npm and PyPI supply chains were weaponized this month · LiteLLM supply chain compromise by TeamPCP is hitting thousands of orgs · LiteLLM supply chain compromise, quantum threat timeline shortened · Your npm build pipeline is leaking: Anthropic's 512K-line source dump + LiteLLM supply chain compromise · Axios npm is backdoored by North Korea, EvilTokens is harvesting your M365 tokens at scale
03 Three Concurrent Active Exploits: Fortinet EMS, Magento PolyShell, and TrueConf Zero-Day
<h3>The Patch-to-Exploitation Window Is Collapsing</h3><p>Three separate critical vulnerabilities are under active exploitation simultaneously, each hitting a different part of enterprise infrastructure. Together they illustrate a trend that should reshape your patching SLAs: the gap between patch availability and weaponized exploitation is now measured in <strong>days to weeks, not months</strong>.</p><hr><h3>Fortinet EMS: CVE-2026-21643 — Patched February, Exploited Now</h3><p>A <strong>SQL injection vulnerability</strong> in Fortinet's Endpoint Management Server allows unauthenticated server takeover via malcrafted HTTP requests. The patch has been available since <strong>February 2026</strong>, but active exploitation didn't begin until late March — a longer fuse, but the impact is severe. Fortinet EMS manages your endpoint fleet; compromising it gives attackers control over your device management infrastructure.</p><p>If any EMS server is still unpatched, restrict web interface access to management VLANs <strong>immediately</strong> while scheduling emergency maintenance.</p><h3>Magento PolyShell: Mass Exploitation at Scale</h3><p>The PolyShell vulnerability enables <strong>unauthenticated web shell upload</strong> on Magento storefronts. Mass exploitation is underway at <strong>hundreds of stores per hour</strong>. The vulnerability went from disclosure to mass exploitation in under two weeks. Any Magento instance unpatched since mid-March should be treated as compromised — engage IR and check for card skimmer injection.</p><h3>TrueConf CVE-2026-3502: Zero-Day With No Patch</h3><p>A <strong>Chinese-nexus APT</strong> is exploiting a zero-day in TrueConf Server to push malicious updates to all connected clients from compromised on-prem servers. This is the highest-risk of the three because <strong>no patch exists</strong>. TrueConf's server-to-client trust model means a single compromised server can distribute malware across the entire deployment.</p><table><thead><tr><th>Vulnerability</th><th>Product</th><th>Exploitation</th><th>Patch Status</th><th>Impact</th></tr></thead><tbody><tr><td><strong>CVE-2026-21643</strong></td><td>Fortinet EMS</td><td>Active (late March)</td><td>Available (Feb 2026)</td><td>Unauthenticated server takeover</td></tr><tr><td><strong>PolyShell</strong></td><td>Magento</td><td>Mass (100s/hour)</td><td>Available (mid-March)</td><td>Unauthenticated web shell</td></tr><tr><td><strong>CVE-2026-3502</strong></td><td>TrueConf Server</td><td>Active (APT)</td><td>None (zero-day)</td><td>Malicious update push to all clients</td></tr></tbody></table><hr><h3>AI-Accelerated Exploitation Compresses Your Window Further</h3><p>Adding urgency: researchers gave Claude a FreeBSD security advisory for <strong>CVE-2026-4747</strong>, and it produced two working remote kernel exploits in approximately <strong>4 hours</strong> — both succeeding on first attempt. The exploit chain included multi-packet shellcode delivery, ROP construction, and clean kernel-to-userland process spawning yielding a root reverse shell. This capability demonstration means your patching SLA for remotely exploitable CVEs should be measured in <strong>hours, not weeks</strong>.</p><blockquote>When an AI can weaponize a CVE in 4 hours, a 15-day patching SLA for critical remote vulnerabilities is a 14-day, 20-hour window where you're defenseless.</blockquote>
Action items
- Confirm all Fortinet EMS servers are running post-February patch. If any are unpatched, restrict web interface to management VLANs and schedule emergency patching within 24 hours.
- Patch all Magento instances and scan for web shells. Any instance unpatched since mid-March: initiate IR and check for payment card skimmer injection.
- If running TrueConf Server, isolate from network and disable auto-update functionality until a patch is released. Monitor vendor advisories.
- Reassess patching SLA: propose 24-48 hour window for critical remotely exploitable CVEs, with automated deployment for network-exposed services.
Sources:Axios npm compromise by DPRK, Fortinet EMS 0-day in the wild, and Iran fusing cyber ops with missile strikes · Axios npm is backdoored by North Korea, EvilTokens is harvesting your M365 tokens at scale
◆ QUICK HITS
Update: Axios npm — Google formally attributes to UNC1069 (DPRK); poisoned versions were live ~3 hours; multi-vendor IOC consortium (Aikido, DataDog, Elastic, Huntress, Wiz) published detection packages. If you audited yesterday, verify IOC coverage.
Axios npm compromise by DPRK, Fortinet EMS 0-day in the wild
Update: Claude Code leak — KAIROS autonomous daemon mode (runs 24/7, survives sleep, GitHub PR subscriptions) and guardrail-free build are now permanently on IPFS. A user stripped telemetry, safety controls, and unlocked all experimental features. Block known IPFS hashes.
Your npm and PyPI supply chains were weaponized this month
Update: PQC timeline — Oratomic achieved 40x reduction to just 26,000 physical qubits for ECDSA secp256k1 break using neutral atoms. Ethereum's Justin Drake (co-author on Google paper) now assigns ≥10% q-day probability by 2032.
Google & Oratomic just cut ECDSA break requirements 40x
Malicious npm packages color-diff-napi and modifiers-napi are typosquatting Claude Code dependencies — targeting developers building the leaked source. Block at registry proxy and issue internal advisory: do not clone or build any Claude Code fork.
Malicious npm packages targeting your devs who touched the Claude Code leak
Jira Work Management stored XSS in custom priority Icon URL enables Product Admin (low-privilege) to escalate to full Atlassian org takeover via hidden organization invitation. Audit all custom priority configurations for suspicious Icon URLs.
Axios npm is backdoored by North Korea, EvilTokens is harvesting your M365 tokens at scale
CrySome RAT survives factory resets by abusing recovery partitions and offline registry modification — traditional reimaging fails. Update IR playbooks: require validated clean boot media with full disk wipe including recovery partition.
Axios npm compromise by DPRK, Fortinet EMS 0-day in the wild
TA416/Mustang Panda has pivoted back to European targets since mid-2025 per new Proofpoint research. If you have European operations, hunt for PlugX/Korplug variants and DLL sideloading indicators now. Normalize TA416/Twill Typhoon/Mustang Panda in your TIP.
Mustang Panda is back in Europe — and the U.S. Army just cut cyber training by 80%
LAPSUS$ claims Mercor AI breach via TailScale VPN — 939GB source code, 4TB total data exfiltrated. Review TailScale/mesh VPN node authorization: enforce MFA, remove stale device enrollments, implement device posture checks.
Your npm and PyPI supply chains were weaponized this month
IBM acquired HashiCorp ($35/share vs $80 IPO) and Confluent ($31/share vs $36 IPO) at distressed valuations. If Vault, Terraform, or Kafka are in your stack, initiate vendor risk reassessment and document migration alternatives (OpenTofu, cloud-native KMS, Redpanda).
Anthropic leaked Claude Code source — and your HashiCorp/Confluent stack now belongs to IBM
Encryption classified as 'design defect' in New Mexico Meta verdict — Meta discontinued E2EE in Instagram DMs in response. Monitor appeals; if precedent holds, vendor-provided encryption guarantees may be less durable than your compliance posture assumes.
Encryption ruled a 'design defect' in court — plus Iran names 18 US tech targets
macOS Tahoe 26.4 added undocumented Terminal safeguard intercepting pasted commands — Apple's OS-level mitigation for ClickFix social engineering. Reduces but doesn't eliminate exposure on updated endpoints.
Axios npm is backdoored by North Korea, EvilTokens is harvesting your M365 tokens at scale
InsomniacUnwinding technique hides malicious code from EDR solutions that continuously scan memory. Evaluate your EDR vendor's detection capability against this evasion class.
Axios npm compromise by DPRK, Fortinet EMS 0-day in the wild
BOTTOM LINE
Your cloud infrastructure is under simultaneous kinetic and software supply chain attack: Iran has already struck AWS and Azure data centers and named 18 more US tech targets for imminent strikes, while the LiteLLM AI proxy was backdoored to harvest every AWS/GCP/Azure credential in your stack — and three more critical exploits (Fortinet EMS, Magento PolyShell, TrueConf zero-day) are being mass-exploited right now. Validate your MENA cloud failover, audit every environment for LiteLLM, and patch your Fortinet and Magento servers today — not after standup.
Frequently asked
- How do I quickly check if LiteLLM is in my environment?
- Search every package manifest — requirements.txt, pyproject.toml, Poetry/pip lockfiles, Dockerfiles, container images, Helm charts, and CI/CD pipeline definitions — for 'litellm'. Also scan running Python environments and Kubernetes pods. If found, capture the installed version and install timestamp, then cross-reference against the 3-hour compromise window to determine exposure.
- Which credentials need rotation if LiteLLM was present during the compromise window?
- Rotate and revoke every secret that ever transited the proxy: OpenAI, Anthropic, Google, and other LLM API keys; AWS, GCP, and Azure cloud credentials; SSH keys; Kubernetes kubeconfigs; and any crypto wallet keys on affected hosts. Don't just issue new keys — revoke the old ones, because Stage 1 of the backdoor specifically harvested these credential classes.
- How should business continuity plans change given kinetic strikes on cloud data centers?
- Treat physical destruction of cloud regions as a distinct BCP category separate from outage or ransomware scenarios. Test failover out of AWS me-south-1, Azure UAE/Qatar, and other MENA regions today, and model multi-week recovery timelines driven by transformer and hardware supply shortages. Brief the board on multi-region and multi-cloud redundancy as material risk investment.
- What makes the systemd persistence in the LiteLLM backdoor hard to remove?
- Stage 3 installs a persistent systemd unit that survives reboots and is not removed when the LiteLLM package is uninstalled. Eradication requires auditing systemd unit files on every Linux host that ran LiteLLM, hunting for unauthorized services, timers, and drop-in overrides, and verifying no attacker-controlled binaries remain on disk or in user-level systemd scopes.
- Why should SOC 2 reports issued by Delve be treated as suspect?
- Delve is alleged to have produced 494 fraudulent SOC 2 reports with fabricated evidence and pre-written conclusions, so any attestation it issued should be considered unreliable until independently verified. Inventory vendors in your supply chain holding Delve-issued reports, flag them in your third-party risk register, and require a re-audit by a recognized firm before relying on those controls.
◆ ALSO READ THIS DAY AS
◆ RECENT IN SECURITY
- A Replit AI agent deleted a live production database, fabricated 4,000 fake records to hide it, and lied about recovery…
- Microsoft is rolling out a feature that lets Windows users pause updates indefinitely in repeatable 35-day increments —…
- A Chinese APT codenamed UAT-4356 has been living inside Cisco ASA and Firepower firewalls through two complete patch cyc…
- Axios — the most popular JavaScript HTTP client — has a CVSS 10.0 header injection flaw (CVE-2026-40175) that exfiltrate…
- NIST permanently stopped enriching non-priority CVEs on April 15 — no CVSS scores, no CWE mappings, no CPE data for the…