TeamPCP Hijacks Telnyx PyPI Package to Deploy WAV-Hidden Stealer
TeamPCP compromised the popular telnyx Python SDK on PyPI, hiding credential-stealing malware inside WAV audio files. Versions 4.87.1 and 4.87.2 affected—downgrade immediately.
The threat actor TeamPCP has struck again, this time compromising the telnyx Python package on PyPI and using audio steganography to conceal credential-stealing malware inside WAV files. The attack continues an aggressive supply chain campaign that has already hit Trivy, litellm, and KICS in recent weeks.
What Happened
On March 27, 2026, attackers pushed two malicious versions of the telnyx SDK—4.87.1 and 4.87.2—to the Python Package Index. According to researchers at Aikido, both versions remained available for approximately six hours between 03:51 UTC and 10:13 UTC before PyPI quarantined the project.
The telnyx package provides a Python interface to Telnyx's telecommunications API and has accumulated over 742,000 downloads. Anyone who installed or upgraded the library during that window should assume full compromise.
How the Attack Works
TeamPCP injected malicious code into telnyx/_client.py, causing it to execute automatically when applications import the package. The payload differs by operating system:
Windows systems:
- The malware downloads
hangup.wavfrom a command-and-control server - It extracts an embedded executable from the audio file using steganography
- A file named
msbuild.exedrops into the Windows Startup folder for persistence across reboots
Linux and macOS systems:
- A different audio file (
ringtone.wav) delivers the payload - A Python-based collector script runs entirely in memory
- The malware operates within a self-destructing temporary directory, leaving near-zero forensic artifacts
Both variants harvest credentials, environment variables, shell histories, and Kubernetes service account tokens. Stolen data gets compressed into tpcp.tar.gz and exfiltrated via HTTP POST with XOR obfuscation.
Indicators of Compromise
Security teams should monitor for:
- C2 server: 83.142.209[.]203:8080
- Windows artifact:
msbuild.exepresent in Startup directories - Network traffic: HTTP POST requests containing
tpcp.tar.gz - Audio files: Downloads of
hangup.wavorringtone.wavfrom suspicious sources
The Bigger Picture
This compromise is part of TeamPCP's broader campaign targeting developer tooling across multiple ecosystems. The group has announced collaborations with LAPSUS$ and an emerging ransomware operation called Vect, signaling ambitions beyond simple credential theft.
The telnyx attack demonstrates increasing sophistication. Hiding payloads inside audio files isn't new, but combining steganography with software supply chain compromise creates a detection challenge—network security tools rarely inspect audio traffic, and the legitimate-looking WAV downloads blend into normal application behavior.
For organizations tracking this threat actor, the pattern is now clear: TeamPCP targets popular developer packages, compromises maintainer credentials or CI/CD pipelines, and rapidly deploys credential stealers before detection. The group moves fast—the Trivy and litellm compromises followed similar playbooks within days of each other.
Immediate Actions
- Audit all Python environments for telnyx versions 4.87.1 or 4.87.2
- Downgrade to version 4.87.0 immediately if affected
- Rotate all secrets—assume complete credential exposure if the malicious versions ran
- Search Windows systems for
msbuild.exein Startup folders - Block the C2 infrastructure at your network perimeter
The telnyx project on GitHub has acknowledged the incident and confirmed that version 4.87.0 remains safe. PyPI has quarantined the package pending further review.
Organizations using Python in CI/CD pipelines should consider pinning dependencies by hash rather than version number—a practice that would have prevented automatic installation of the compromised releases. For broader guidance on protecting development environments, see our supply chain attack defense guide.
Related Articles
Xinference AI Package Compromised on PyPI in TeamPCP Wave
Three malicious versions of the xinference AI inference library were uploaded to PyPI, targeting cloud credentials and SSH keys from 680K+ users. TeamPCP claims a copycat is responsible.
May 4, 2026PyPI Package With 1.1M Downloads Hijacked to Push Infostealer
Attackers compromised elementary-data version 0.23.3 on PyPI, pushing malicious code to 1.1 million monthly users. The infection extended to Docker images via automated workflows.
May 4, 2026PyTorch Lightning Compromised on PyPI to Steal Developer Secrets
TeamPCP threat actors backdoored versions 2.6.2 and 2.6.3 of the popular AI framework, harvesting SSH keys, cloud credentials, and GitHub tokens from millions of developers.
May 1, 2026CPUID Hijacked: CPU-Z, HWMonitor Downloads Served Malware
Attackers compromised CPUID's website API for six hours, redirecting CPU-Z and HWMonitor downloads to trojanized installers that steal browser credentials using advanced evasion techniques.
Apr 10, 2026