Telnyx Package Compromised - TeamPCP Supply Chain Attack

The Telnyx Python SDK was compromised in a supply chain attack. With 742,000 downloads, this breach puts many developers at risk. Immediate action is needed to secure affected environments.

Threat IntelHIGHUpdated: Published: ๐Ÿ“ฐ 6 sources

Original Reporting

CSCyber Security NewsยทGuru Baran

AI Summary

CyberPings AIยทReviewed by Rohit Rana

๐ŸŽฏBasically, a popular coding tool got hacked, putting many users at risk.

The Threat

This morning, the official Telnyx Python SDK on PyPI was compromised as part of a supply chain attack by the threat actor group TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded to PyPI, executing silently upon import. With 742,000 downloads recently, this attack poses a significant risk to developers and organizations relying on this SDK.

The attack is part of a larger, escalating campaign that began on March 19, 2026. TeamPCP's method involves compromising trusted tools, stealing credentials, and using those to target additional victims. This pattern has created a chain reaction of breaches, with the Telnyx incident being the latest in a series of coordinated attacks.

Who's Behind It

TeamPCP has demonstrated a systematic approach to their attacks. They first compromised Aqua Securityโ€™s vulnerability scanner, Trivy, leading to the theft of CI/CD credentials. Using these stolen credentials, they then targeted other projects, deploying backdoors and malicious code across numerous platforms. Their tactics include using WAV steganography to conceal malware within seemingly innocent audio files, making detection difficult. The timeline of their operations shows a clear escalation in their techniques, culminating in the Telnyx compromise. This structured approach not only highlights their capabilities but also raises alarms about the potential for further breaches in the coming weeks.

Tactics & Techniques

The malicious payload in the Telnyx package executes at import time, making it particularly insidious. On Windows, it downloads a file that contains an obfuscated executable, ensuring persistence by placing it in the Startup folder. On Linux and macOS, the attack uses a hardcoded script that fetches another payload, which is then executed to exfiltrate sensitive data.

This dual-path execution strategy allows TeamPCP to maximize their reach across different operating systems, significantly increasing the potential impact of their attack. The use of steganography to hide malicious code within audio files is a notable tactic that complicates detection efforts by security tools.

Defensive Measures

Organizations that have downloaded the compromised Telnyx versions must act immediately. The first step is to remove the malicious packages and revert to a safe version. It's crucial to treat any affected environments as compromised โ€” this means rotating all credentials and tokens that may have been exposed.

Additionally, organizations should monitor network traffic for any connections to the attacker's command and control server and audit their CI/CD pipelines for signs of further compromise. The FBI has warned of an expected surge in breach disclosures and follow-on intrusions, making it essential for organizations using Python-based tools to enforce strict version control and security measures across their development environments.

๐Ÿ”’ Pro Insight

๐Ÿ”’ Pro insight: TeamPCP's use of steganography marks a significant evolution in supply chain attack tactics, complicating detection and response efforts.

๐Ÿ“… Story Timeline

Story broke by Cyber Security News

Covered by Infosecurity Magazine

Covered by SecurityWeek

Covered by Cyber Security News

Covered by The Register Security

Covered by Help Net Security

Covered by Trend Micro Research

Related Pings