Security Now Episode 1072: "LiteLLM - Click Fix Attacks Surge"
Date: April 1, 2026
Hosts: Steve Gibson & Leo Laporte
Episode Overview
In this episode, Steve and Leo tackle one of the most alarming recent cybersecurity incidents: a major supply chain attack involving LiteLLM, a widely trusted AI gateway, which leveraged a compromised open source dependency to inject sophisticated malware into developer environments. They dive into the mechanics, fallout, and lessons of the exploit. The duo also cover the ongoing surge in 'Click Fix' (ClickJacking) social engineering attacks, debate the controversial California OS age verification law and its impact (especially on Linux), review Apple's response to age gating on iOS, discuss alarming trends in bot and AI-generated content on Reddit, and review the forward march towards quantum-resistant cryptography.
Table of Contents
- Headline Topics
- California’s Age Verification Law & OS Impact
- Click Fix Attacks: The New Cybercrime Boom
- Quantum Computing and Post-Quantum Crypto
- Russia’s 5G Encryption Plans
- Vibe Coding, AI, and SaaS Disruption
- LiteLLM PyPI Supply Chain Attack: Deep Dive
- Reddit’s Bot Epidemic & Proof of Humanity Dilemma
- Key Quotes
- Notable Moments & Timestamps
- Security Takeaways
1. Headline Topics
- [04:01] Major supply chain malware attack hits LiteLLM via PyPI, affecting developer ecosystems.
- [09:34] Click Fix attacks escalate, now accounting for over half of all breaches.
- [21:42] California's new digital age assurance law riles the open-source (esp. Linux) world.
- [56:21] Apple, under pressure, rolls out age verification in iOS for the UK and South Korea.
- [72:54] Google shifts “Q-Day”—when quantum computers threaten encryption—to 2029.
- [74:18] Rise of "Vibe coding": AI-written apps challenge SaaS and security models.
- [100:42] Reddit faces an AI-bot posting epidemic, considers FaceID for access.
2. California Age Verification Law & Linux Impact
[15:20 — 53:21]
- Background: California Assembly Bill 1043 requires all operating system providers to supply age bracket signals to apps, with significant potential impact on open platforms like Linux and SteamOS.
- Scope & Unworkability: The law expects all OS providers to maintain a real-time API for age verification, despite open platforms being decentralized (e.g., Linux, Arch, Ubuntu).
- Key Issues:
- No ID upload required, only self-reported age ("You just say how old you are." – Leo [32:25]).
- Enforcement by California Attorney General only (not lawsuits).
- Law would force many niche or open source distributions to either comply or restrict use for Californians.
- Critique & Recommendations:
- Reason Foundation highlights privacy improvements vs. other states but warns against making age signaling mandatory.
- Steve: “This solution places the handling and responsibility of their young child’s age into the parent’s hands, where it should be—not the government, not the OS, not the platform provider.” [46:10]
- Suggests opt-in implementation, managed by parents. Also, using birth date over age to auto-update across brackets.
- Industry Response:
- Linux distros and alternative Android OSes (e.g., Graphene) mostly refuse to comply; technical enforcement is unfeasible.
- Newsom signed law, but urged amendments before activation due to technical+UX complexity for shared/multidevice accounts.
- Apple’s Response:
- iOS 26.4 now requests age proof in UK & South Korea; can request credit card / ID photo [56:21].
- Apple’s implementation is seen as a sign of the new normal: “If this has to happen, I trust Apple more than any other third party to protect its users' privacy.” – Steve [57:00]
- Takeaway: There is consensus that some solution is coming, but both hosts express skepticism about the wisdom, feasibility, and impact for open-source communities.
3. Click Fix Attacks: The New Cybercrime Boom
[90:14 — 100:42]
-
What is Click Fix?
Social engineering attack that convinces users to run arbitrary, malicious code (e.g., pasting dangerous commands into Windows Run or macOS Terminal) under the guise of "fixing" a problem. -
Explosive Growth:
- Now accounts for over 50% of all breaches.
"This family of readily blocked exploits … now accounts for more than half of all security breaches." – Steve [95:59]
- Now accounts for over 50% of all breaches.
-
How It Works:
- Tailors to victims via OS detection, custom lures (e.g., appearing as a fix for QuickBooks or Booking.com).
- Users are instructed to enter or paste scripts themselves, bypassing browser/endpoint controls.
-
Notable Mitigations:
- MacOS 26.4 now blocks suspicious pastes in Terminal, alerts user: “Possible malware paste blocked” [97:02].
- Microsoft yet to respond for Windows, despite prevalence.
- IT admins can disable Windows Run or constrain PowerShell, but this is impractical for home users: “Most Windows users don’t really know how Windows works…” – Steve [96:29]
- Behavioral security hardening, not just indicator/blocking, is advised.
4. Quantum Computing: Is “Q Day” Coming?
[72:54 — 74:18]
- Google’s Position:
Moves the anticipated "Q Day" (when quantum computers break public crypto) up to 2029, underscoring urgency to migrate to post-quantum crypto. - Current Defenses:
Chrome, Google Cloud, Apple, Signal, Cloudflare, AWS, Azure, Meta, and Zoom all now support PQC; TLS 1.3 can negotiate quantum-safe connections. - Steve’s Skepticism:
- “I just don’t see [quantum decryption] by 2029. If they’re jumping up and down about factoring 31 and then we find out they cheated… I have a hard time getting worked up about this.” [73:10]
- Practical Advice:
- Use post-quantum crypto where available: “Our chips are fast enough; … no reason not to do dual quantum or dual crypto schemes.” – Steve [73:55]
5. Russia’s 5G Encryption Boondoggle
[58:48 — 67:12]
- Summary: Russia plans to mandate the use of a home-grown NEA 7 encryption standard for future 5G networks, rendering standard phones incompatible and isolating itself technologically by 2032.
- Critique:
“One of the most important lessons taught by the Industrial Revolution is the incredible power that comes from standardization… this clearly demonstrates the insanity of what Mother Russia is choosing to do.” – Steve [65:30] - Predicted Result:
Russian citizens will be stuck with poor hardware; foreign makers unlikely to comply.
6. Vibe Coding, AI, and the SaaS-pocalypse
[74:18 — 87:24]
-
Definition:
“Vibe coding” refers to software heavily generated by AI with little human input—allowing in-house teams to rapidly replicate SaaS tools. -
Implications:
- Could disrupt SaaS industry (why pay subscriptions if you can vibe-code a custom tool overnight?).
- “The op. The opportunity … is a bunch of programmers saying, okay Claude, here’s what we need… and presto bango, you got an app.” – Steve [85:28]
-
Risks:
- Hasty, AI-generated code may inherit/invent security flaws.
- SaaS existed because cloud vendors do infra/security for you; in-house bespoke code may lack robust maintenance or review.
- “It does seem pretty clear that this is going to be an accelerating trend… but there will be a few stumbles along the way.” – Steve [84:49]
7. LiteLLM PyPI Supply Chain Attack: Deep Dive
[113:58—139:04]
a. What is LiteLLM?
- Extremely popular open-source Python gateway bridging >100 LLMs (OpenAI, Anthropic, Cohere, etc.) with a unified API.
- Used by big names (Rocket Money, Adobe, Netflix, Lemonade); >3.4M downloads per day at time of attack.
- “...acts as a bridge between the application and major LLM providers, letting you manage requests, responses and errors consistently.” [Few minutes after 117:19]
b. Timeline & Discovery
- [117:19] Malware introduced via a dependency in PyPI.
- [119:19] Callum McMahon (Future Search) downloads and experiences system crash—diagnosis reveals fork-bomb style worm in “init.pth” file; >11,000 Python processes launched, pegging CPU.
- [126:38] Claude AI assists in forensics; pinpoints and decodes the malicious payload, which had been live for ~46 minutes but downloaded 47,000 times.
c. Attack Chain
- Infection spread via unpinned dependencies (auto-updated to malicious version).
- Malicious versions deployed 3-stage payload:
- Credential harvester: Targets AWS, cloud tokens, SSH keys, k8s secrets, DB strings.
- Kubernetes toolkit: For lateral movement/exfil.
- Persistent backdoor for ongoing RCE.
- Team PCP, a skilled criminal group, orchestrated the supply chain compromise in coordination with similar attacks on other security tools (Trivy, Checkmarx KICS).
- Root Infection: Began with exploit of a vulnerability scanner (Trivy). Attackers stole privileged tokens (not rotated atomically), enabling push of trojanized versions downstream.
- Accidental Containment:
- “A sloppy, likely vibe coded mistake … led it to turn into a fork bomb … The malware’s own poor quality made it visible and discoverable.” – Steve, quoting McMahon [131:07]
- Had the error not made affected systems crash, 3.4M downloads/day would have spread credential-stealing malware.
d. Lessons and Takeaways
- Supply chain attacks now target security tooling.
“This is the meta attack. A security scanner … became the entry point for a supply chain compromise.” – Steve/Trend Micro [146:34] - Automation risk:
- CI/CD pipelines and “automatic upgrades” with unpinned dependencies put trust in upstream authors—who may themselves be compromised.
- Better Practice:
- Always pin dependency versions; use lockfiles with checksums; critical to audit before upgrading.
- Reduce local code execution via remote containers.
- Quote:
“We have dodged another bullet… [the industry] has built an ecosystem upon which it has become dependent … whose security guarantees are truly fragile.” [158:59]
8. Reddit’s Bot Epidemic & Proof of Humanity Dilemma
[100:42 — 109:37]
- AI Bots Posting:
Study finds ~15% of Reddit posts now AI-generated. Actual number could be much higher. - Reddit Considers:
- Experimenting with FaceID, TouchID, or 3rd-party providers to confirm humanness of posters.
- User Pushback:
Users rebel, fearing end to anonymity and a “death warrant” for Reddit culture. - Broader Trend:
Discord already requires face scans for some users (to keep minors out); these ID datasets have themselves been breached.- “Content aggregator Dig ... was forced to pause operations and lay off staff in response to the horde of bots on its platform.” [102:42]
- No Solution?
- “We have an undetectable bot problem.” – Steve [105:15]
- “This is a problem that has no solution … I do not see a solution here.” – Steve [107:18]
- AI detectors (and human intuition) cannot reliably distinguish human from AI content anymore.
9. Key Quotes
- “How many bullets do we dodge before we get hit by one?” – Leo [09:37]
- “Security will truly be sacrificed on the altar of economics.” – Steve [82:44]
- “Apple ... did the right thing, which Microsoft refuses to do.” – Steve [04:01, 97:02]
- “We have an undetectable bot problem.” – Steve [105:15]
- “If this had not been caught … the resulting mess would have been far worse.” – Steve [158:32]
- “Click Fix now accounts for more than half of all security breaches.” – Steve [95:59]
- “Why would any large enterprise rent under an expensive recurring subscription what a handful of their in house coders could whip up overnight using vibe coding?” – Steve [80:01]
- "All we can really do at this point is hope that our luck holds." – Steve [159:56]
10. Notable Moments & Timestamps
| Timestamp | Segment/Quote/Discussion | |------------|---------------------------------------------------------------------------------------------------| | 04:01 | Overview of LiteLLM attack; Click Fix; Age verification hot topics | | 32:25 | “What good is that? ... just nonsense.” — on the self-reported age in CA law (Leo & Steve) | | 56:21 | Apple begins iOS age verification in UK and South Korea | | 67:12 | Russian 5G encryption proposal (NEA 7 “patriotic legislative flex”) | | 72:54 | Google moves “Q-Day” up to 2029; Steve’s skepticism | | 90:14 | RecordedFuture’s Click Fix (Clickjacking) attack investigation | | 95:59 | “Now accounts for more than half of all security breaches” – Steve, on Click Fix | | 97:02 | MacOS 26.4 implements copy-paste malware warning in Terminal; Apple praised | | 100:42 | Reddit’s AI bot epidemic and FaceID experiments | | 113:58 | What is LiteLLM and why is it so popular? (Pre-attacks background) | | 119:19 | LiteLLM malware technical details, Callum McMahon's forensic write-up | | 131:07 | “A sloppy, likely vibe coded mistake ... led it to turn into a fork bomb.” | | 135:13 | Trend Micro’s analysis: Trivy supply chain root, exploit walkthrough | | 146:34 | "This is the meta attack…” – supply chain compromise via security scanner | | 158:32 | “Had the bad guys not made that mistake...” – scope of global disaster averted | | 159:56 | “We knowingly and deliberately create dependencies upon sprawling packages over which we have no oversight or direct control.” – Steve | | 162:44 | “Imagine if this had gone on for a day or two…” – Leo, on the supply chain blast radius |
11. Security Takeaways
- Supply Chain Security:
Even major open source projects (LiteLLM) are only as strong as the least secure dependency and CI/CD practice. Pin your dependencies, audit upgrades. - Social Engineering Still Dominates:
Click Fix/clickjacking campaigns increasingly bypass technical controls by exploiting human trust and OS-native tools. - AI Drastically Changes Attack Scenarios:
AI accelerates both defensive and offensive campaigns (e.g., automating incident response and incident creation). - Regulation Friction:
Well-meaning privacy/child-protection laws (like CA’s) are not implementable for open systems; “age gating” is coming, with best outcomes relying on parental opt-in and local control. - Identity Paradox:
The battle with bots is escalating; new proof-of-humanity systems threaten anonymity, which is itself core to valued online communities. - Quantum-Resistant Crypto:
Panic isn’t warranted yet, but migration to post-quantum cryptography is prudent. - The Fragility of Ecosystems:
Trust, convenience, and automation have yielded fragile but essential systems—hope and fast detection remain critical tools.
For More
- Callum McMahon's full LiteLLM malware write-up: See [119:19].
- Trend Micro technical analysis of the LiteLLM supply chain compromise: See [139:04].
- MacOS 26.4 Terminal paste jacking alert: [97:02].
- California Assembly Bill 1043 text and Reason Foundation critique: [15:20–53:21].
If You Only Remember Three Things:
- LiteLLM attack: A supply chain flaw in a dependency almost enabled theft of credentials from millions of developers—the only thing that saved us was a clumsy coding mistake.
- Click Fix attacks: Socially engineered “run this command” attacks are now the #1 way users get pwned—it’s not zero-days, but simple, psychology-driven hacks.
- We’re building on fragile trust: Both convenience/automation and culture (e.g., online anonymity) are under siege—from attackers, regulators, and sometimes the tools we trust most.
Hosts' Tone:
Conversational, occasionally irreverent, but always detailed and deeply technical. Both encourage active skepticism, critical thinking, and community-based defense, with respect for both privacy and the practical compromises technology demands today.
End of Summary.
This episode is essential listening for developers, IT and security professionals, and anyone wanting to understand the rapidly shifting risks of modern cyber-ecosystems, from open source to AI to regulatory enforcement.