«

Mercor公司表示,其系统遭受的网络攻击与开源项目LiteLLM的安全漏洞有关。

qimuai 发布于 阅读:0 一手编译


Mercor公司表示,其系统遭受的网络攻击与开源项目LiteLLM的安全漏洞有关。

内容来源:https://techcrunch.com/2026/03/31/mercor-says-it-was-hit-by-cyberattack-tied-to-compromise-of-open-source-litellm-project/

内容总结:

知名AI招聘初创公司Mercor近日确认遭遇一起供应链安全事件,该事件与开源项目LiteLLM遭受攻击有关。黑客组织Lapsus$声称已窃取该公司数据并公开了部分样本。

Mercor发言人向媒体表示,公司属于“受LiteLLM项目漏洞影响的数千家企业之一”,并已迅速采取遏制和补救措施。目前公司正联合第三方取证专家展开全面调查,持续与客户及合作方沟通,全力推进事件解决。

据悉,LiteLLM项目于上周被发现植入恶意代码,虽在数小时内被清除,但其日均数百万次下载量的广泛使用范围引发安全界高度关注。此次事件已促使LiteLLM调整其合规流程,更换认证服务商。

Mercor成立于2023年,主要通过招募印度等地的科学家、医生、律师等专业人才为OpenAI、Anthropic等企业训练AI模型。该公司2025年10月完成3.5亿美元C轮融资后估值达100亿美元,目前日均支付金额超200万美元。

截至目前,受LiteLLM漏洞影响的企业数量及具体数据泄露规模仍在调查中。Mercor方面未回应事件是否与Lapsus$声称的攻击直接关联,也未证实用户及合作方数据是否遭窃取或滥用。

中文翻译:

知名AI招聘初创公司Mercor近日确认遭遇安全事件,该事件与开源项目LiteLLM遭受的供应链攻击有关。这家AI初创公司周二向TechCrunch表示,自己是近期LiteLLM项目遭黑客组织TeamPCP入侵影响的"数千家企业之一"。事件确认之际,勒索黑客组织Lapsus$宣称已锁定Mercor为目标并获取其数据。

目前尚不清楚Lapsus$团伙如何从TeamPCP的网络攻击中获得Mercor的被盗数据。Mercor成立于2023年,通过与OpenAI和Anthropic等公司合作,从印度等市场招募科学家、医生、律师等专业领域专家来训练AI模型。该公司宣称每日促成超200万美元的薪酬支付,并在2025年10月由Felicis Ventures领投的3.5亿美元C轮融资后估值达100亿美元。

Mercor发言人海蒂·哈格伯格向TechCrunch证实,公司已"迅速采取行动"控制并修复安全事件。"我们正在顶尖第三方取证专家的支持下开展全面调查,"哈格伯格表示,"我们将继续酌情与客户和承包商直接沟通,并投入必要资源尽快解决问题。"

此前,Lapsus$在其泄密网站上宣称对此次数据泄露事件负责,并分享了据称从Mercor获取的数据样本。TechCrunch核查的样本中包含涉及Slack通信数据、工单系统数据的资料,以及两段据称展示Mercor平台AI系统与承包商对话的视频。

哈格伯格拒绝回答关于该事件是否与Lapsus$声明有关,或是否有客户及承包商数据被访问、窃取或滥用的后续问题。

LiteLLM遭入侵事件最初于上周曝光,当时在该YC支持的初创公司开源项目相关软件包中发现恶意代码。虽然恶意代码在数小时内被识别并清除,但由于LiteLLM在全球互联网广泛使用(安全公司Snyk数据显示其库文件日均下载量达数百万次),该事件引发密切关注。此事还促使LiteLLM调整合规流程,包括从颇具争议的初创公司Delve转向使用Vanta进行合规认证。

随着调查持续进行,目前尚不清楚有多少企业受LiteLLM相关事件影响,也不确定是否发生数据泄露。

英文来源:

Mercor, a popular AI recruiting startup, has confirmed a security incident linked to a supply chain attack involving the open-source project LiteLLM.
The AI startup told TechCrunch on Tuesday that it was “one of thousands of companies” affected by a recent compromise of LiteLLM’s project, which was linked to a hacking group called TeamPCP. Confirmation of the incident comes as extortion hacking group Lapsus$ claimed it had targeted Mercor and gained access to its data.
It’s not immediately clear how the Lapsus$ gang obtained the stolen data from Mercor as part of TeamPCP’s cyberattack.
Founded in 2023, Mercor works with companies including OpenAI and Anthropic to train AI models by contracting specialized domain experts such as scientists, doctors, and lawyers from markets including India. The startup says it facilitates more than $2 million in daily payouts and was valued at $10 billion following a $350 million Series C round led by Felicis Ventures in October 2025.
Mercor spokesperson Heidi Hagberg confirmed to TechCrunch that the company had “moved promptly” to contain and remediate the security incident.
“We are conducting a thorough investigation supported by leading third-party forensics experts,” said Hagberg. “We will continue to communicate with our customers and contractors directly as appropriate and devote the resources necessary to resolving the matter as soon as possible.”
Earlier, Lapsus$ claimed responsibility for the apparent data breach on its leak site and shared a sample of data allegedly taken from Mercor, which TechCrunch reviewed. The sample included material referencing Slack data and what appeared to be ticketing data, as well as two videos purportedly showing conversations between Mercor’s AI systems and contractors on its platform.
Disrupt 2026: The tech ecosystem, all in one room
Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $400.
Save up to $300 or 30% to TechCrunch Founder Summit
1,000+ founders and investors come together at TechCrunch Founder Summit 2026 for a full day focused on growth, execution, and real-world scaling. Learn from founders and investors who have shaped the industry. Connect with peers navigating similar growth stages. Walk away with tactics you can apply immediately
Offer ends March 13.
Hagberg declined to answer follow-up questions on whether the incident was connected to claims by Lapsus$, or whether any customer or contractor data had been accessed, exfiltrated, or misused.
The compromise of LiteLLM originally surfaced last week after malicious code was discovered in a package associated with the Y Combinator-backed startup’s open-source project. While the malicious code was identified and removed within hours, the incident drew scrutiny due to LiteLLM’s widespread use around the internet, with the library downloaded millions of times per day, per security firm Snyk. The incident also prompted LiteLLM to make changes to its compliance processes, including shifting from controversial startup Delve to Vanta for compliance certifications.
It remains unclear how many companies were affected by the LiteLLM-related incident or whether any data exposure occurred, as investigations continue.

TechCrunchAI大撞车

文章目录


    扫描二维码,在手机上阅读