Malware & RansomwareHIGH

Malware - TeamPCP Compromises Telnyx Versions on PyPI

THThe Hacker News
TeamPCPtelnyxPythonmalwaresupply chain attack
🎯

Basically, hackers hid malware in a popular Python package to steal user data.

Quick Summary

TeamPCP has compromised the telnyx Python package on PyPI, pushing malicious versions to steal sensitive data. Developers must downgrade to a safe version immediately to protect their systems.

What Happened

On March 27, 2026, TeamPCP compromised the telnyx Python package by uploading two malicious versions, 4.87.1 and 4.87.2, to the Python Package Index (PyPI). These versions were designed to steal sensitive data from users by concealing their malware within a .WAV file. This attack follows a previous supply chain incident involving other tools like Trivy and litellm.

The malicious code was injected into the file telnyx/_client.py, which executes when the package is imported into Python applications. This allows the malware to target users across Windows, Linux, and macOS systems, significantly increasing its potential impact.

Who's Being Targeted

The attack primarily targets developers who use the telnyx package in their applications. Since telnyx is often integrated into various software projects, the risk of widespread exposure is high. The malicious versions can harvest credentials and other sensitive information from any system that imports the compromised package.

Reports from cybersecurity firms like Aikido, Endor Labs, and Socket indicate that the malware employs sophisticated techniques to evade detection, including audio steganography. This method allows the malware to hide its payload within audio files, making it difficult for traditional security measures to flag the malicious activity.

Signs of Infection

Users may not notice any immediate signs of infection. However, if you have installed telnyx versions 4.87.1 or 4.87.2, you should be vigilant. Signs of infection could include the presence of a file named msbuild.exe in the Windows Startup folder, which indicates that the malware is set to run every time the system starts. On Linux and macOS, look for unusual activity related to audio files or unexpected network requests.

The malware is designed to exfiltrate sensitive data, including environment variables and configuration files, which can lead to further compromises if not addressed quickly.

How to Protect Yourself

To protect against this threat, developers should take immediate action. First, audit your Python environments and check for any instances of telnyx version 4.87.1 or 4.87.2. If found, downgrade to the clean version 4.87.0 immediately. Additionally, rotate all secrets and credentials that may have been exposed.

It’s also crucial to block the command-and-control (C2) domain associated with the malware, 83.142.209[.]203, to prevent further data exfiltration. Keeping your development environments secure and monitoring for unusual activities will help mitigate the risks posed by this sophisticated attack.

🔒 Pro insight: The use of audio steganography in this attack highlights a growing trend of sophisticated malware delivery methods that evade traditional detection mechanisms.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHMalware & Ransomware

Nation-State Malware - Dark Web Exploit Kits Exposed

Nation-state malware is now available on the Dark Web, threatening organizations everywhere. This trend makes it easier for attackers to exploit vulnerabilities. Companies need to step up their cybersecurity measures to stay safe.

Dark Reading·
HIGHMalware & Ransomware

Malware - China Enhances BPFdoor for Global Telco Espionage

China's Red Menshen has upgraded its BPFdoor malware, posing a serious threat to telecoms worldwide. This advanced malware bypasses traditional defenses, making detection crucial. Telecom companies must enhance their security measures to combat this evolving threat.

Dark Reading·
HIGHMalware & Ransomware

Malware Alert - Fake VS Code Alerts Target Developers on GitHub

A large-scale malware campaign is targeting GitHub developers with fake VS Code alerts. These deceptive posts trick users into downloading harmful software. Stay vigilant and verify alerts before acting.

BleepingComputer·
HIGHMalware & Ransomware

Malware - TeamPCP Backdoors Telnyx PyPI Package Again

TeamPCP has backdoored the Telnyx SDK on PyPI, delivering malware through malicious packages. Developers using this SDK are at risk of sensitive data exposure. Immediate action is necessary to secure affected environments.

Help Net Security·
HIGHMalware & Ransomware

Malware - Hackers Target South Asian Financial Firm with BRUSHWORM

A South Asian financial firm was hit by a targeted cyberattack using BRUSHWORM and BRUSHLOGGER malware. This attack highlights the growing risk to financial institutions. Security teams are urged to implement strict measures to protect sensitive data and prevent further breaches.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Bogus Avast Website Installs Venom Stealer

A fake Avast site tricks users into downloading malware. This malware, Venom Stealer, targets passwords and crypto wallets. Quick action is needed to protect sensitive information.

Malwarebytes Labs·