Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telnyx SDK on PyPI Compromised by Hackers

Telnyx SDK on PyPI Compromised by Hackers

Posted on March 30, 2026 By CWS

A significant security incident has emerged involving the Telnyx Python SDK, a widely used package available on PyPI, the primary repository for Python developers. On March 27, 2026, a malicious actor identified as TeamPCP uploaded two compromised versions of this software, potentially affecting countless users and systems.

Details of the Security Breach

The altered versions, 4.87.1 and 4.87.2, were accessible for approximately four hours before PyPI intervened and quarantined them. During this brief period, any system installing these versions could have been compromised without any visible signs of intrusion.

Telnyx’s package is not obscure; it records around 750,000 downloads monthly. Consequently, the scope of this attack could extend far beyond direct users, affecting any project or service reliant on it. The attackers targeted a single file within the package, leaving the rest unchanged, thus making the breach more difficult to detect.

Mechanics of the Attack

The attack was part of a larger supply chain campaign by TeamPCP, linked to the notorious TeamTNT group. This campaign also targeted several other platforms and packages within a short timeframe, showcasing increasing sophistication with each attack.

The compromised package followed a three-stage attack process. Initially, it triggered a platform-specific loader, which then downloaded a hidden payload from a remote server, cleverly disguised within a WAV audio file. Finally, the payload harvested sensitive credentials, encrypting and sending them to an attacker-controlled server.

Mitigation and Response Measures

The infection mechanism relied on modifications to a file called _client.py, which automatically executed upon importing the library. To conceal their actions, attackers encoded sensitive data using base64, making detection more difficult.

Organizations that installed the affected versions should consider them as breached and initiate immediate incident response. This includes rotating all accessible credentials and manually removing persistent threats from affected systems.

Preventative measures are crucial. Developers should pin dependencies to specific versions, utilize lockfiles, enable two-factor authentication on PyPI accounts, and avoid storing secrets in unprotected files. Additionally, blocking specific IP addresses at the firewall level is recommended to prevent further intrusions.

Stay informed with our latest updates on cybersecurity threats by following us on Google News, LinkedIn, and X, and consider setting CSN as a preferred source on Google.

Cyber Security News Tags:cloud credentials, Cybersecurity, dev security, Malware, PyPI hack, Python SDK, software development, supply chain attack, TeamPCP, Telnyx

Post navigation

Previous Post: European Commission Confirms Cyberattack on Cloud Systems
Next Post: Critical Security Threats and Global Cyber Developments

Related Posts

Google Forms Exploited in New PureHVNC Malware Attack Google Forms Exploited in New PureHVNC Malware Attack Cyber Security News
Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability Hackers Actively Scanning Internet to Exploit XWiki Remote Code Execution Vulnerability Cyber Security News
Preventing OAuth Consent Abuse in Entra ID Preventing OAuth Consent Abuse in Entra ID Cyber Security News
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Engineers Charged in Silicon Valley Trade Secrets Case Engineers Charged in Silicon Valley Trade Secrets Case Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Big Tech Challenges Canadian Encryption Bill Amidst Security Concerns
  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Big Tech Challenges Canadian Encryption Bill Amidst Security Concerns
  • Microsoft Warns of Attacks via HPE Operations Agent
  • Hackers Exploit OrBit Rootkit to Steal Linux Credentials
  • OpenAI Addresses TanStack Supply Chain Breach
  • OpenAI Faces Supply Chain Cyberattack: macOS Updates Needed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark