BotBeat
...
← Back

> ▌

N/AN/A
INDUSTRY REPORTN/A2026-03-27

Telnyx PyPI Package Compromised in Ongoing TeamPCP Supply Chain Attack Campaign

Key Takeaways

  • ▸Telnyx PyPI package compromised with malware hidden in WAV files using steganography and XOR obfuscation
  • ▸Part of coordinated TeamPCP campaign spanning multiple ecosystems (npm, PyPI, GitHub Actions) over two weeks
  • ▸Attack chain leverages stolen credentials from unpinned CI/CD tools to compromise high-impact packages
Source:
Hacker Newshttps://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm↗

Summary

The popular Telnyx Python SDK on PyPI has been compromised as part of an escalating multi-week supply chain attack campaign by the threat actor TeamPCP. Malicious versions of the package were uploaded on March 27, featuring sophisticated malware that uses WAV file steganography to deliver payloads. The attack follows a consistent pattern: stealing credentials from trusted security tools, then using those credentials to inject backdoors into packages with broad downstream reach.

The Telnyx compromise is the latest in a series targeting major tools and services. Previous targets include Aqua Security's Trivy vulnerability scanner (March 19), 46+ npm packages via CanisterWorm (March 20), Checkmarx GitHub Actions (March 23), and LiteLLM's PyPI package (March 24), which serves 95 million monthly downloads. The campaign demonstrates sophisticated evasion techniques, including XOR obfuscation, AES-256-CBC encryption, and RSA-4096 key wrapping for exfiltrated data.

The malware executes at import time with no disabling mechanisms, making it difficult to prevent execution. On Windows, it downloads and decodes an executable hidden in audio frames, installing it as msbuild.exe in the Startup folder for persistence. On Linux/Mac, it fetches a complete Python script embedded in WAV files, exfiltrating system data encrypted with attacker-controlled RSA keys.

  • Malware executes at import time with sophisticated persistence and encryption mechanisms to evade detection
  • LiteLLM compromise particularly concerning as it manages credentials for OpenAI, Anthropic, AWS, and GCP services
MLOps & InfrastructureCybersecurityOpen Source

More from N/A

N/AN/A
RESEARCH

Machine Learning Model Identifies Thousands of Unrecognized COVID-19 Deaths in the US

2026-04-05
N/AN/A
POLICY & REGULATION

Trump Administration Proposes Deep Cuts to US Science Agencies While Protecting AI and Quantum Research

2026-04-05
N/AN/A
RESEARCH

UCLA Study Reveals 'Body Gap' in AI: Language Models Can Describe Human Experience But Lack Embodied Understanding

2026-04-04

Comments

Suggested

Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05
GitHubGitHub
PRODUCT LAUNCH

GitHub Launches Squad: Open Source Multi-Agent AI Framework to Simplify Complex Workflows

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us