TeamPCP Hijacks Telnyx PyPI Package to Deploy WAV-Hidden Stealer
TeamPCP compromised the popular telnyx Python SDK on PyPI, hiding credential-stealing malware inside WAV audio files. Versions 4.87.1 and 4.87.2 affected—downgrade immediately.
The threat actor TeamPCP has struck again, this time compromising the telnyx Python package on PyPI and using audio steganography to conceal credential-stealing malware inside WAV files. The attack continues an aggressive supply chain campaign that has already hit Trivy, litellm, and KICS in recent weeks.
What Happened
On March 27, 2026, attackers pushed two malicious versions of the telnyx SDK—4.87.1 and 4.87.2—to the Python Package Index. According to researchers at Aikido, both versions remained available for approximately six hours between 03:51 UTC and 10:13 UTC before PyPI quarantined the project.
The telnyx package provides a Python interface to Telnyx's telecommunications API and has accumulated over 742,000 downloads. Anyone who installed or upgraded the library during that window should assume full compromise.
How the Attack Works
TeamPCP injected malicious code into telnyx/_client.py, causing it to execute automatically when applications import the package. The payload differs by operating system:
Windows systems:
- The malware downloads
hangup.wavfrom a command-and-control server - It extracts an embedded executable from the audio file using steganography
- A file named
msbuild.exedrops into the Windows Startup folder for persistence across reboots
Linux and macOS systems:
- A different audio file (
ringtone.wav) delivers the payload - A Python-based collector script runs entirely in memory
- The malware operates within a self-destructing temporary directory, leaving near-zero forensic artifacts
Both variants harvest credentials, environment variables, shell histories, and Kubernetes service account tokens. Stolen data gets compressed into tpcp.tar.gz and exfiltrated via HTTP POST with XOR obfuscation.
Indicators of Compromise
Security teams should monitor for:
- C2 server: 83.142.209[.]203:8080
- Windows artifact:
msbuild.exepresent in Startup directories - Network traffic: HTTP POST requests containing
tpcp.tar.gz - Audio files: Downloads of
hangup.wavorringtone.wavfrom suspicious sources
The Bigger Picture
This compromise is part of TeamPCP's broader campaign targeting developer tooling across multiple ecosystems. The group has announced collaborations with LAPSUS$ and an emerging ransomware operation called Vect, signaling ambitions beyond simple credential theft.
The telnyx attack demonstrates increasing sophistication. Hiding payloads inside audio files isn't new, but combining steganography with software supply chain compromise creates a detection challenge—network security tools rarely inspect audio traffic, and the legitimate-looking WAV downloads blend into normal application behavior.
For organizations tracking this threat actor, the pattern is now clear: TeamPCP targets popular developer packages, compromises maintainer credentials or CI/CD pipelines, and rapidly deploys credential stealers before detection. The group moves fast—the Trivy and litellm compromises followed similar playbooks within days of each other.
Immediate Actions
- Audit all Python environments for telnyx versions 4.87.1 or 4.87.2
- Downgrade to version 4.87.0 immediately if affected
- Rotate all secrets—assume complete credential exposure if the malicious versions ran
- Search Windows systems for
msbuild.exein Startup folders - Block the C2 infrastructure at your network perimeter
The telnyx project on GitHub has acknowledged the incident and confirmed that version 4.87.0 remains safe. PyPI has quarantined the package pending further review.
Organizations using Python in CI/CD pipelines should consider pinning dependencies by hash rather than version number—a practice that would have prevented automatic installation of the compromised releases. For broader guidance on protecting development environments, see our supply chain attack defense guide.
Related Articles
TeamPCP Poisons LiteLLM Package With Three-Stage Backdoor
Malicious LiteLLM versions 1.82.7 and 1.82.8 deployed credential harvester, Kubernetes lateral movement tools, and persistent backdoor. Package sees 3 million daily downloads.
Mar 25, 2026Vidar Infostealer Spreads via Hacked WordPress Sites
Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.
Mar 28, 2026Infiniti Stealer: macOS Malware Uses ClickFix and Nuitka Compilation
A new macOS infostealer combines ClickFix social engineering with Nuitka-compiled Python to evade detection. First documented campaign pairing these techniques.
Mar 27, 2026Copyright Phishing Delivers PureLog Stealer to Healthcare, Gov
Fake copyright infringement notices target healthcare and government organizations in Germany and Canada with fileless PureLog Stealer malware. Campaign uses language-matched lures.
Mar 26, 2026