How SentinelOne’s AI EDR Autonomously Discovered and Stopped Anthropic’s Claude from Executing a Zero Day Supply Chain Attack, Globally

Dev.to / 4/2/2026

📰 NewsDeveloper Stack & InfrastructureSignals & Early TrendsIdeas & Deep Analysis

Key Points

  • The report describes a zero-day-style supply chain compromise of LiteLLM (a proxy layer for LLM API calls) detected on March 24, 2026, with attacker infrastructure tied to “TeamPCP.”
  • The attackers obtained PyPI credentials by first compromising the Trivy security scanner, then distributed malicious LiteLLM package versions to target developers and AI infrastructure.
  • Malicious code execution spread both through conventional manual installs and autonomously via AI coding assistants such as Claude Code running with unrestricted permissions.
  • The multi-stage payload focused on data theft (including cryptocurrency wallets and cloud credentials), established persistence using systemd services, and attempted Kubernetes lateral movement by creating privileged pods.
  • SentinelOne’s Singularity Platform blocked the threat across customer environments using autonomous, behavioral analysis of Python process patterns rather than static signatures, highlighting the need to defend against high-speed attacks enabled by over-privileged AI agents.

This report details a sophisticated supply chain compromise of LiteLLM, a popular proxy layer for LLM API calls, detected on March 24, 2026. The attack was initiated by an actor known as TeamPCP, who first compromised the Trivy security scanner to obtain PyPI credentials for LiteLLM. Once compromised, malicious versions of the package were distributed, targeting developers and AI infrastructure. Notably, the infection spread through traditional manual installs and autonomously via AI coding assistants like Claude Code running with unrestricted permissions.

The technical execution involved multi-stage payloads designed for data theft, including cryptocurrency wallets and cloud credentials. The malware established persistence using systemd services and attempted lateral movement within Kubernetes environments by creating privileged pods. SentinelOne’s Singularity Platform identified and blocked the threat autonomously across various customer environments by analyzing the behavioral patterns of the malicious Python processes rather than relying on static signatures.

This incident highlights a critical new attack surface: AI agents with excessive system permissions that can unknowingly facilitate supply chain attacks at machine speed. The speed of the attack underscores the necessity of behavioral-based autonomous defense to close the gap between exploit velocity and human-driven investigation capacity.

Read Full Article