{"id":48648,"date":"2026-04-03T22:52:04","date_gmt":"2026-04-03T22:52:04","guid":{"rendered":"https:\/\/agooka.com\/news\/business\/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk\/"},"modified":"2026-04-03T22:52:04","modified_gmt":"2026-04-03T22:52:04","slug":"meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk","status":"publish","type":"post","link":"https:\/\/agooka.com\/news\/business\/meta-pauses-work-with-mercor-after-data-breach-puts-ai-industry-secrets-at-risk\/","title":{"rendered":"Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk"},"content":{"rendered":"<p>Save StorySave this storySave StorySave this story<\/p>\n<p>Meta has paused all its work with the data contracting firm Mercor while it investigates a major security breach that impacted the startup, two sources confirmed to WIRED. The pause is indefinite, the sources said. Other major AI labs are also reevaluating their work with Mercor as they assess the scope of the incident, according to people familiar with the matter.<\/p>\n<p>Mercor is one of a few firms that OpenAI, Anthropic, and other AI labs rely on to generate training data for their models. The company hires massive networks of human contractors to generate bespoke, proprietary datasets for these labs, which are typically kept highly secret as they\u2019re a core ingredient in the recipe to generate valuable AI models that power products like ChatGPT and Claude Code. AI labs are sensitive about this data because it can reveal to competitors\u2014including other AI labs in the US and China\u2014key details about the ways they train AI models. It\u2019s unclear at this time whether the data exposed in Mercor\u2019s breach would meaningfully help a competitor.<\/p>\n<p>While OpenAI has not stopped its current projects with Mercor, it is investigating the startup\u2019s security incident to see how its proprietary training data may have been exposed, a spokesperson for the company confirmed to WIRED. The spokesperson says that the incident in no way affects OpenAI user data, however. Anthropic did not immediately respond to WIRED\u2019s request for comment.<\/p>\n<p>Mercor confirmed the attack in an email to staff on March 31. \u201cThere was a recent security incident that affected our systems along with thousands of other organizations worldwide,\u201d the company wrote.<\/p>\n<p>A Mercor employee echoed these points in a message to contractors on Thursday, WIRED has learned. Contractors who were staffed on Meta projects cannot log hours until\u2014and if\u2014the project resumes, meaning they could functionally be out of work, a source familiar claims. The company is working to find additional projects for those impacted, according to internal conversations viewed by WIRED.<\/p>\n<p>Mercor contractors were not told exactly why their Meta projects were being paused. In a Slack channel related to the Chordus initiative\u2014a Meta-specific project to teach AI models to use multiple internet sources to verify their responses to user queries\u2014a project lead told staff that Mercor was \u201ccurrently reassessing the project scope.\u201d<\/p>\n<p>An attacker known as TeamPCP appears to have recently compromised two versions of the AI API tool LiteLLM. The breach exposed companies and services that incorporate LiteLLM and installed the tainted updates. There could be thousands of victims, including other major AI companies, but the breach at Mercor illustrates the sensitivity of the compromised data.<\/p>\n<p>Mercor and its competitors\u2014such as Surge, Handshake, Turing, Labelbox, and Scale AI\u2014have developed a reputation for being incredibly secretive about the services they offer to major AI labs. It\u2019s rare to see the CEOs of these firms speaking publicly about the specific work they offer, and they internally use codenames to describe their projects.<\/p>\n<p>Adding to the confusion around the hack, a group going by the well-known name Lapsus$ claimed this week that it had breached Mercor. In a Telegram account and on a BreachForums clone, the actor offered to sell an array of alleged Mercor data, including a 200-plus GB database, nearly 1 TB of source code, and 3 TBs of video and other information. But researchers say that many cybercriminal groups now periodically take up the Lapsus$ name and that Mercor\u2019s confirmation of the LiteLLM connection means that the attacker is likely TeamPCP or an actor connected to the group.<\/p>\n<p>TeamPCP appears to have compromised the two LiteLLM updates as part of an even larger supply chain hacking spree in recent months that has been gaining momentum, catapulting TeamPCP to prominence. And while launching data extortion attacks and working with ransomware groups, such as the group known as Vect, TeamPCP has also strayed into political territory, spreading a data wiping worm known as \u201cCanisterWorm\u201d through vulnerable cloud instances with Farsi as their default language or clocks set to Iran\u2019s time zone.<\/p>\n<p>\u201cTeamPCP is definitely financially motivated,\u201d says Allan Liska, an analyst for the security firm Recorded Future who specializes in ransomware. \u201cThere might be some geopolitical stuff as well, but it\u2019s hard to determine what\u2019s real and what\u2019s bluster, especially with a group this new.\u201d<\/p>\n<p>Looking at the dark-web posts of the alleged Mercor data, Liska adds, \u201cThere is absolutely nothing that connects this to the original Lapsus$.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Save StorySave this storySave StorySave this story Meta has paused all its work with the data contracting firm Mercor while it investigates a major security breach that impacted the startup, two sources confirmed to WIRED. The pause is indefinite, the sources said. Other major AI labs are also reevaluating their work with Mercor as they [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":48649,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":{"0":"post-48648","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business"},"_links":{"self":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts\/48648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/comments?post=48648"}],"version-history":[{"count":0,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/posts\/48648\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/media\/48649"}],"wp:attachment":[{"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/media?parent=48648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/categories?post=48648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/agooka.com\/news\/wp-json\/wp\/v2\/tags?post=48648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}