On 31 March 2026, AI hiring platform Mercor confirmed it had suffered a catastrophic data breach. The notorious Lapsus$ hacking group claimed responsibility, alleging it had stolen approximately four terabytes of company data — including 939GB of source code, a 211GB user database containing CVs and personal information, and nearly 3TB of stored files including video interviews and identity verification documents such as passports.
If you run a small business and your first reaction is "that's an enterprise problem, not mine" — stop right there. The attack chain that brought Mercor to its knees started with a compromised open-source software library that millions of organisations use. The lessons from this breach apply to every business, regardless of size.
What Actually Happened
Mercor didn't get breached because a hacker sat in a dark room and cracked their password. The breach came through the back door — a supply chain attack. Here's what that means in plain terms.
Mercor used an open-source tool called LiteLLM as part of its technology stack. On 24 March 2026, a threat group called TeamPCP managed to publish poisoned versions of LiteLLM to PyPI, the public repository where developers download Python software. Those poisoned versions contained hidden malware designed to steal credentials — passwords, encryption keys, and access tokens.
The malware harvested those credentials and sent them back to the attackers. From there, Lapsus$ — who appear to have been collaborating with TeamPCP — used the stolen access to walk straight into Mercor's internal systems via their Tailscale VPN. Once inside, they had the keys to everything: source code, databases, file storage, the lot.
The stolen data is now being auctioned on the dark web.
Why This Matters to Your Business
You might not be a $10 billion AI startup, but the mechanics of this attack are universal. Think about your own business for a moment:
- Do you use software that updates automatically?
- Do your staff install browser extensions, plugins, or free tools?
- Do you rely on a single password — or even a strong password without multi-factor authentication — to access your critical systems?
- Could someone who gained access to one system move freely to others?
If you answered yes to any of those, you share the same fundamental vulnerabilities that Mercor had. The difference is scale. For Mercor, the breach means regulatory scrutiny, lawsuits, and reputational damage measured in the hundreds of millions. For a small business, a breach of this nature could mean closure.
How Cyber Essentials Would Have Helped
The UK Government's Cyber Essentials scheme exists precisely because breaches like this keep happening — and because the same basic failures keep enabling them. The scheme is built around five technical controls. Let's walk through each one and see how they relate directly to the Mercor breach.
1. Firewalls and Internet Gateways
Mercor's Tailscale VPN was compromised, giving attackers free movement through internal systems. Proper boundary controls — firewalls configured to restrict traffic, segment networks, and prevent unauthorised outbound connections — would have limited the damage. If your internal systems can talk freely to the internet without restriction, stolen credentials become an open motorway for attackers.
What SOC in a Box does: Every deployment includes managed firewall monitoring. Your named analyst reviews firewall rules and ensures your boundary defences are configured correctly and stay that way.
2. Secure Configuration
The LiteLLM compromise succeeded partly because the software was installed without version pinning — meaning the system automatically pulled in whatever version was newest, including the poisoned one. Secure configuration means removing unnecessary software, disabling default accounts, and ensuring systems only run what they need to run.
What SOC in a Box does: Our onboarding process includes a full configuration review. EmilyAI, our AI triage layer, continuously monitors for configuration drift — systems that have deviated from their secure baseline.
3. Security Update Management
This is where it gets nuanced. The Mercor breach was caused by a malicious update, not a missing one. But the principle still holds: you need to know exactly what software is running in your environment, and you need a process for verifying that updates are legitimate before they're applied. Under the 2026 Cyber Essentials update, failing to apply critical security patches within 14 days is now an automatic certification failure.
What SOC in a Box does: Vulnerability scanning is included in every package. We track what's installed, what needs updating, and what looks suspicious — so you don't have to.
4. User Access Control
Once inside Mercor's VPN, the attackers had access to everything — source code, databases, file storage, identity documents. That suggests a lack of proper access segmentation. The principle of least privilege means every user and every system should only have access to what it absolutely needs. An intern shouldn't be able to browse the passport database. A development tool shouldn't have production database credentials.
What SOC in a Box does: We review and monitor your access controls as part of the service. Our analysts flag excessive permissions, shared accounts, and dormant admin access — the silent risks that most small businesses never think to check.
5. Malware Protection
The TeamPCP malware was sophisticated — a three-stage payload that harvested credentials, moved laterally through systems, and installed persistent backdoors. But it was still malware. Modern endpoint detection and response (EDR) tools, properly configured and monitored, can catch this kind of behaviour even when the malware is brand new and unknown to signature-based antivirus.
What SOC in a Box does: We replace standalone antivirus with properly monitored EDR, watched 24/7 by both EmilyAI and your named human analyst. When something behaves like malware — even if no signature exists for it yet — we catch it.
The Supply Chain Problem Is Your Problem
The most important lesson from the Mercor breach is that you don't need to be directly targeted to become a victim. Mercor wasn't specifically targeted by TeamPCP. They were caught in the blast radius of a broader supply chain campaign that compromised tools used by millions of organisations.
For small businesses, this means you need to think beyond your own four walls. Who are your software suppliers? What tools do your staff use? What happens if one of those tools is compromised?
You can't audit every line of code in every tool you use. But you can ensure that the five Cyber Essentials controls are in place, so that when something does go wrong — and eventually it will — the damage is contained, detected quickly, and resolved before it becomes catastrophic.
What You Should Do Today
Don't wait for your own breach to start taking this seriously. Here are practical steps you can take right now:
- Enable multi-factor authentication everywhere. Under the 2026 Cyber Essentials update, failing to enable MFA where it's available is an automatic certification failure. If your email, cloud storage, or accounting software offers MFA, turn it on today.
- Audit your software. Know what's installed on every device in your business. Remove anything that isn't needed.
- Segment your access. Not everyone needs access to everything. Review who can access what and tighten permissions.
- Patch promptly. Critical updates must be applied within 14 days. Set a process and stick to it.
- Get certified. Cyber Essentials certification starts at £320 + VAT and comes with cyber liability insurance for organisations with turnover under £20m.
The average UK small business breach costs £15,300 in direct expenses alone. Factor in lost productivity, reputational damage, and client attrition — the true cost becomes incalculable. Prevention is not just cheaper than cure. It's the difference between staying in business and closing your doors.
Stop Paying for Security That Doesn't Work Together
SOC in a Box replaces your standalone antivirus, managed firewall, vulnerability scanning, dark web monitoring, and Cyber Essentials certification with a single service — watched 24/7 by a named analyst backed by eight years of AI. From £335 per month.
See what's included