The official Telnyx Python SDK on PyPI was compromised as part of a broader supply chain campaign conducted by the threat group TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded on March 27, 2026, embedding code that executes automatically at import time across Windows, Linux, and macOS systems. Unlike typical attacks relying on install scripts, this payload triggers the moment the telnyx module is imported. The malware downloads payloads disguised as .wav audio files, decodes hidden content, establishes persistence, and exfiltrates sensitive data such as API keys and credentials using encrypted communication. This compromise is part of a larger credential-chaining campaign active since March 19, 2026, where TeamPCP targets trusted developer tools and open-source packages. The attackers leverage stolen CI/CD credentials to compromise additional ecosystems, creating a cascading effect across platforms like npm, PyPI, and GitHub Actions. A key technique used is WAV steganography, where malicious payloads are hidden within legitimate-looking audio files to evade detection. The Telnyx attack demonstrates a highly automated and scalable approach, allowing rapid propagation and deeper access into developer environments and cloud infrastructure. Organizations should treat any environment using the affected versions as fully compromised and immediately rotate all credentials. Security teams must enforce strict dependency management practices, including version pinning and validation of third-party packages. Continuous monitoring, network blocking of known malicious endpoints, and auditing of CI/CD pipelines are critical to detect and prevent further lateral movement. Developers should also adopt secure coding practices and limit exposure of sensitive tokens across environments.
A surge in cyberattacks targeting financial institutions has been linked to the rapid rise of PXA Stealer, a sophisticated information-stealing malware. Its emergence follows the t...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical supply chain vulnerability (CVE-2026-33634) in Aqua Security’s Trivy scanner, adding it to...
A financial institution in South Asia was recently targeted in a coordinated cyberattack involving two custom malware strains, BRUSHWORM and BRUSHLOGGER. These tools were deployed ...