Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telnyx Python SDK Backdoored by Hackers to Steal Credentials

Telnyx Python SDK Backdoored by Hackers to Steal Credentials

Posted on April 1, 2026 By CWS

A group of cybercriminals known as TeamPCP has infiltrated the Telnyx Python SDK on PyPI, a widely used cloud communications library, resulting in over 700,000 downloads in February 2026. This infiltration is part of a larger scheme aimed at stealing credentials from systems running Windows, macOS, and Linux.

Malicious Package Deployment

On March 27, 2026, TeamPCP released two harmful package versions, 4.87.1 and 4.87.2, on the Python Package Index (PyPI), without corresponding commits to the official GitHub repository. This breach reflects one of the most extensive supply chain attacks on open-source developers this year, underscoring the evolving threats in software development environments.

This attack closely followed the compromise of the LiteLLM AI proxy package, indicating a rapid escalation in TeamPCP’s activities. Their focus appears to be on trusted open-source libraries that support AI and developer tools, showcasing their ability to embed malicious code stealthily into legitimate package releases without immediate detection.

Analysis and Impact

Security experts at Trend Micro brought attention to the Telnyx attack, noting that the compromised versions were removed from PyPI approximately 6.5 hours after being uploaded. The attackers embedded harmful code within the telnyx/_client.py file, triggering upon the basic action of importing the module, thus compromising developer systems with minimal interaction required.

The attack’s ramifications are severe, urging any user of the affected package versions to assume their systems are compromised. The embedded payload was engineered to siphon credentials to an attacker-controlled server, employing robust encryption methods such as AES-256-CBC and RSA-4096. Additionally, Windows users faced further risk with a mechanism ensuring the malware’s persistence across reboots.

Technical Innovations in the Attack

TeamPCP’s attack introduced a novel approach by embedding the credential-stealing payload within WAV audio files. Unlike previous attacks where the payload was directly encoded within the source as Base64, the Telnyx variant fetched the malware from a command-and-control server, cunningly disguising it within a legitimate audio file format.

This method effectively bypassed traditional static code analysis, as the actual malicious logic did not reside in the visible code base. The payload retrieval process involved reading raw audio data, decoding it via Base64, and finally executing it after decrypting with a rotating XOR key. This intricacy in concealment posed significant challenges for defenders attempting to conduct a straightforward visual inspection of the code.

For Windows systems, the attackers installed a deceptive executable named msbuild.exe in the Startup directory to ensure persistence. Organizations are advised to monitor for unusual WAV file downloads from non-media IP addresses over port 8080 and unexpected outbound HTTP requests to mitigate risks.

Users are strongly encouraged to revert to the safe version 4.87.0 of the Telnyx SDK and rotate credentials for accounts potentially exposed. Continuous monitoring of CI/CD pipelines for unexpected file downloads or connections is also recommended to safeguard against future threats.

Cyber Security News Tags:credentials theft, Cybersecurity, Malware, open source security, PyPI, Python SDK, supply chain attack, TeamPCP, Telnyx, WAV steganography

Post navigation

Previous Post: North Korean Group Linked to Axios npm Attack
Next Post: Axios NPM Compromised in North Korean Cyber Attack

Related Posts

Microsoft Upgrades .NET Bounty Program with Rewards Up to ,000 Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
Disney Agreed to Pay  Million for Collection Personal Data From Children Disney Agreed to Pay $10 Million for Collection Personal Data From Children Cyber Security News
APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data APT-C-60 Attacking Job Seekers to Download Weaponized VHDX File from Google Drive to Steal Sensitive Data Cyber Security News
Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely Critical FluentBit Vulnerabilities Let Attackers to Cloud Environments Remotely Cyber Security News
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser Cyber Security News
Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address Let’s Encrypt Started to Issue SSL/TLS Certificate for IP Address Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How Attackers Exploit Trusted Tools in Cybersecurity
  • TAC Security Surpasses 10,000 Clients Milestone
  • Critical PNG Vulnerabilities Threaten System Security
  • Axios NPM Compromised in North Korean Cyber Attack
  • Telnyx Python SDK Backdoored by Hackers to Steal Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How Attackers Exploit Trusted Tools in Cybersecurity
  • TAC Security Surpasses 10,000 Clients Milestone
  • Critical PNG Vulnerabilities Threaten System Security
  • Axios NPM Compromised in North Korean Cyber Attack
  • Telnyx Python SDK Backdoored by Hackers to Steal Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark