TeamPCP Hijacks Telnyx PyPI Package to Deploy WAV-Hidden Stealer
TeamPCP compromised the popular telnyx Python SDK on PyPI, hiding credential-stealing malware inside WAV audio files. Versions 4.87.1 and 4.87.2 affected—downgrade immediately.
The threat actor TeamPCP has struck again, this time compromising the telnyx Python package on PyPI and using audio steganography to conceal credential-stealing malware inside WAV files. The attack continues an aggressive supply chain campaign that has already hit Trivy, litellm, and KICS in recent weeks.
What Happened
On March 27, 2026, attackers pushed two malicious versions of the telnyx SDK—4.87.1 and 4.87.2—to the Python Package Index. According to researchers at Aikido, both versions remained available for approximately six hours between 03:51 UTC and 10:13 UTC before PyPI quarantined the project.
The telnyx package provides a Python interface to Telnyx's telecommunications API and has accumulated over 742,000 downloads. Anyone who installed or upgraded the library during that window should assume full compromise.
How the Attack Works
TeamPCP injected malicious code into telnyx/_client.py, causing it to execute automatically when applications import the package. The payload differs by operating system:
Windows systems:
- The malware downloads
hangup.wavfrom a command-and-control server - It extracts an embedded executable from the audio file using steganography
- A file named
msbuild.exedrops into the Windows Startup folder for persistence across reboots
Linux and macOS systems:
- A different audio file (
ringtone.wav) delivers the payload - A Python-based collector script runs entirely in memory
- The malware operates within a self-destructing temporary directory, leaving near-zero forensic artifacts
Both variants harvest credentials, environment variables, shell histories, and Kubernetes service account tokens. Stolen data gets compressed into tpcp.tar.gz and exfiltrated via HTTP POST with XOR obfuscation.
Indicators of Compromise
Security teams should monitor for:
- C2 server: 83.142.209[.]203:8080
- Windows artifact:
msbuild.exepresent in Startup directories - Network traffic: HTTP POST requests containing
tpcp.tar.gz - Audio files: Downloads of
hangup.wavorringtone.wavfrom suspicious sources
The Bigger Picture
This compromise is part of TeamPCP's broader campaign targeting developer tooling across multiple ecosystems. The group has announced collaborations with LAPSUS$ and an emerging ransomware operation called Vect, signaling ambitions beyond simple credential theft.
The telnyx attack demonstrates increasing sophistication. Hiding payloads inside audio files isn't new, but combining steganography with software supply chain compromise creates a detection challenge—network security tools rarely inspect audio traffic, and the legitimate-looking WAV downloads blend into normal application behavior.
For organizations tracking this threat actor, the pattern is now clear: TeamPCP targets popular developer packages, compromises maintainer credentials or CI/CD pipelines, and rapidly deploys credential stealers before detection. The group moves fast—the Trivy and litellm compromises followed similar playbooks within days of each other.
Immediate Actions
- Audit all Python environments for telnyx versions 4.87.1 or 4.87.2
- Downgrade to version 4.87.0 immediately if affected
- Rotate all secrets—assume complete credential exposure if the malicious versions ran
- Search Windows systems for
msbuild.exein Startup folders - Block the C2 infrastructure at your network perimeter
The telnyx project on GitHub has acknowledged the incident and confirmed that version 4.87.0 remains safe. PyPI has quarantined the package pending further review.
Organizations using Python in CI/CD pipelines should consider pinning dependencies by hash rather than version number—a practice that would have prevented automatic installation of the compromised releases. For broader guidance on protecting development environments, see our supply chain attack defense guide.
Related Articles
CPUID Hijacked: CPU-Z, HWMonitor Downloads Served Malware
Attackers compromised CPUID's website API for six hours, redirecting CPU-Z and HWMonitor downloads to trojanized installers that steal browser credentials using advanced evasion techniques.
Apr 10, 2026TeamPCP Poisons LiteLLM Package With Three-Stage Backdoor
Malicious LiteLLM versions 1.82.7 and 1.82.8 deployed credential harvester, Kubernetes lateral movement tools, and persistent backdoor. Package sees 3 million daily downloads.
Mar 25, 2026NWHStealer Spreads via Fake Proton VPN Sites and Gaming Mods
Multiple campaigns distribute NWHStealer infostealer through counterfeit Proton VPN installers, gaming modifications, and YouTube-promoted downloads. Targets browser data and 25+ crypto wallets.
Apr 16, 2026108 Chrome Extensions Steal OAuth Tokens and Telegram Sessions
Security researchers expose 108 malicious Chrome extensions operating under five fake publishers, stealing Google OAuth tokens, Telegram sessions, and injecting ads. Over 20,000 users affected.
Apr 16, 2026