Mercor says it was hit by cyberattack tied to compromise LiteLLM (techcrunch.com)

by jackson-mcd 45 comments 151 points
Read article View on HN

45 comments

[−] nope1000 44d ago

> The incident also prompted LiteLLM to make changes to its compliance processes, including shifting from controversial startup Delve to Vanta for compliance certifications.

This is pretty funny.

The leaked excel sheet with customers of Delve is basically a shortlist of targets for hackers to try now. Not that they necessarily have bad security, but you can play the odds

[−] _pdp_ 43d ago
I am not defending Delve or anything and I hope they get what they deserver but there is no correlation between SOC2 certification and the actual cyber capability of a company. SOC2 and ISO27001 is just compliance and frankly most of it is BS.
[−] nope1000 43d ago
Sure it's certainly not perfect and a lot of the documentation is something you just write for the audit and never look at it again but that's why I am saying play the odds. The average delve customer startup might be less secure that the average startup who has to justify their processes to a real auditor.
[−] coldstartops 43d ago
Personally, I use them as frameworks to justify management processes.

A) I tie the cybersecurity activities to business revenue enabling outcomes (unblocked contracts), and second to reduced risk (as people react less to this when spending the buck).

B) with the political capital from point A) I actually operate a cybersecurity program, justify DevSecOps artefacts, threat modeling, incident response exercises, etc.

What this SOC2 reports, ISO27k certificates are, more like a standardization for communicating the activities of the org to outside people, and getting an external person to vet that the org doesn't bulls*t too much. but at the end of the day, the organization is responsible for keeping their house in order.

[−] Lucasoato 43d ago
I went through SOC2 Type I and II. I’d say that most of that stuff is necessary, like splitting environments and so on. That doesn’t mean it’s anything close to sufficient to avoid being hacked.

It’s a framework to give you the direction, then if employees are careless (or even malicious), no security standard is complete enough to protect a company.

[−] robshippr 43d ago
Second major supply chain compromise in a week after the axios npm attack. 40 minutes and 500k machines affected. SOC2 won't catch this. The real question is whether your CI pipeline would have flagged a dependency change that happened between your last build and the one going to prod. Most teams have no visibility into that window at all.
[−] CafeRacer 43d ago
I am genuinely wonder if anyone have had success landing gigs at Mercor.
[−] sharadov 43d ago
Could not happened to a more usurious company.
[−] aservus 44d ago
This is a good reminder that any tool handling sensitive data — even internal ones — needs to be transparent about where data goes. The assumption that SaaS tools protect your data is getting harder to defend.
[−] cat-whisperer 43d ago
all leaks are tied together
[−] signalflow 43d ago
[flagged]
[−] Adam_cipher 43d ago
[flagged]
[−] Chepko932 43d ago
[dead]
[−] tazsat0512 44d ago
[dead]
[−] devcraft_ai 44d ago
[flagged]
[−] signalflow 43d ago
[flagged]
[−] techpulselab 44d ago
[flagged]
[−] n1tro_lab 43d ago
[flagged]
[−] ashishb 44d ago
[flagged]