Threat IntelHIGH

Telnyx Package Compromised - TeamPCP Supply Chain Attack

CSCyber Security News
TeamPCPTelnyxTrivyCanisterWormCVE-2026-33634
🎯

Basically, a popular coding tool got hacked, putting many users at risk.

Quick Summary

The Telnyx Python SDK was compromised in a supply chain attack. With 742,000 downloads, this breach puts many developers at risk. Immediate action is needed to secure affected environments.

The Threat

This morning, the official Telnyx Python SDK on PyPI was compromised as part of a supply chain attack by the threat actor group TeamPCP. Malicious versions 4.87.1 and 4.87.2 were uploaded to PyPI, executing silently upon import. With 742,000 downloads recently, this attack poses a significant risk to developers and organizations relying on this SDK.

The attack is part of a larger, escalating campaign that began on March 19, 2026. TeamPCP's method involves compromising trusted tools, stealing credentials, and using those to target additional victims. This pattern has created a chain reaction of breaches, with the Telnyx incident being the latest in a series of coordinated attacks.

Who's Behind It

TeamPCP has demonstrated a systematic approach to their attacks. They first compromised Aqua Security’s vulnerability scanner, Trivy, leading to the theft of CI/CD credentials. Using these stolen credentials, they then targeted other projects, deploying backdoors and malicious code across numerous platforms. Their tactics include using WAV steganography to conceal malware within seemingly innocent audio files, making detection difficult.

The timeline of their operations shows a clear escalation in their techniques, culminating in the Telnyx compromise. This structured approach not only highlights their capabilities but also raises alarms about the potential for further breaches in the coming weeks.

Tactics & Techniques

The malicious payload in the Telnyx package executes at import time, making it particularly insidious. On Windows, it downloads a file that contains an obfuscated executable, ensuring persistence by placing it in the Startup folder. On Linux and macOS, the attack uses a hardcoded script that fetches another payload, which is then executed to exfiltrate sensitive data.

This dual-path execution strategy allows TeamPCP to maximize their reach across different operating systems, significantly increasing the potential impact of their attack. The use of steganography to hide malicious code within audio files is a notable tactic that complicates detection efforts by security tools.

Defensive Measures

Organizations that have downloaded the compromised Telnyx versions must act immediately. The first step is to remove the malicious packages and revert to a safe version. It's crucial to treat any affected environments as compromised — this means rotating all credentials and tokens that may have been exposed.

Additionally, organizations should monitor network traffic for any connections to the attacker's command and control server and audit their CI/CD pipelines for signs of further compromise. The FBI has warned of an expected surge in breach disclosures and follow-on intrusions, making it essential for organizations using Python-based tools to enforce strict version control and security measures across their development environments.

🔒 Pro insight: TeamPCP's use of steganography marks a significant evolution in supply chain attack tactics, complicating detection and response efforts.

Original article from

Cyber Security News · Guru Baran

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Cybersecurity Updates from Week 13

This week in cybersecurity, major ransomware actors faced justice, while new threats like FAUX#ELEVATE emerged. TeamPCP's supply chain attacks highlight the growing risks in software development. Organizations must enhance defenses to combat these evolving threats.

SentinelOne Labs·
HIGHThreat Intel

Threat Intel - Urgent Need to Counter Underwater Drones

The Iran war has escalated the threat from underwater attack drones, prompting urgent action from US and UK forces. This poses significant risks to maritime shipping and infrastructure. Both nations are actively seeking innovative solutions to counter this emerging threat.

The Register Security·
HIGHThreat Intel

Geopolitical Tensions - Cyber Operations on the Rise

The Threat Rising geopolitical tensions are reshaping the cyber landscape. Cyber operations are not just tools of criminal hackers anymore; they are integral to statecraft. As nations grapple with shifting power dynamics, the role of technology in warfare and espionage has become more pronounced. State-sponsored actors are now engaging in sophisticated cyber operations aimed at critical infrastructure, intelligence collection,

The Hacker News·
HIGHThreat Intel

Coruna iOS Exploit - Update to Operation Triangulation

A new iOS exploit kit, Coruna, is targeting vulnerabilities previously used in Operation Triangulation. Millions of devices are at risk, especially those without recent updates. Stay vigilant and ensure your iOS is patched to avoid exploitation.

SecurityWeek·
HIGHThreat Intel

Threat Intel - Cyberattack on Die Linke by Qilin Hackers

Die Linke has fallen victim to a cyberattack by suspected Russian hackers. Sensitive internal data may be compromised. This raises serious concerns about political cybercrime and the integrity of democratic processes.

CSO Online·
HIGHThreat Intel

Espionage Attacks - Hackers Use USB Malware and RATs

Hackers have launched a cyberespionage campaign against a Southeast Asian government. Using USB malware and RATs, they aim to steal sensitive data. This coordinated attack poses significant risks to national security.

Cyber Security News·