Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Salesforce Marketing Cloud Vulnerability Exposed Email Data
May 6, 2026
OpenClaw DeepSeek Skill Exploits AI Work Malicious Agentic
May 6, 2026
Iranian-Nexus Targets Oman Ministries: Webshells & Data
May 6, 2026
Home/Threats/Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials
Threats

Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials

A threat actor group identified as TeamPCP was recently discovered backdooring the Telnyx Python SDK on PyPI, a widely used cloud communications library. This incident, detailed in a This strike came...

Jennifer sherman
Jennifer sherman
April 1, 2026 3 Min Read
1 0

A threat actor group identified as TeamPCP was recently discovered backdooring the Telnyx Python SDK on PyPI, a widely used cloud communications library. This incident, detailed in a

This strike came just three days after TeamPCP compromised the LiteLLM AI proxy package, signaling a fast-moving and escalating campaign.

The group appears to be systematically targeting trusted open-source libraries used in AI and developer tooling environments.

The back-to-back nature of these attacks shows that TeamPCP has a well-prepared toolkit and reliable methods for slipping malicious code into real package releases without triggering immediate detection.

Trend Micro analysts identified and documented the Telnyx attack, noting that both compromised versions were quarantined by PyPI at 10:13 UTC — roughly 6.5 hours after first appearing on the platform.

According to the researchers, malicious code was injected directly into the telnyx/_client.py file, with all execution paths triggered at module scope.

This means that simply running import telnyx in a Python project was enough to activate the payload, with no further action required from the developer.

The impact of this attack is significant. Any developer or organization that installed either of the affected versions should treat their systems as fully compromised.

The payload was designed to steal credentials and send them silently to an attacker-controlled server using an encryption chain that includes AES-256-CBC and RSA-4096.

The attack also reached across all three major operating systems, with Windows users facing the additional risk of a boot persistence mechanism that ensured the malware stayed active and ran automatically after every system restart.

PyPI has since quarantined the malicious versions, and the last confirmed clean release is version 4.87.0. Users who installed the affected packages are strongly advised to downgrade immediately and treat any exposed systems as potentially compromised.

Additionally, credential rotation is strongly recommended for any accounts accessible from affected machines.

WAV Steganography: Malware Hidden Inside Audio Files

The most notable technical shift in this attack is how TeamPCP concealed the credential-stealing payload inside WAV audio files.

Unlike the earlier LiteLLM attack, where the harvester was embedded directly in the source code as a Base64 blob, the Telnyx variant downloaded the malware at runtime from a command-and-control (C&C) server at 83[.]142[.]209[.]203:8080.

The payload was hidden inside structurally valid WAV files that pass standard MIME-type checks, bypass file extension filters, and leave no harvester logic visible in the package source code.

The decoded Base64 payload for Linux downloading the WAV file (Source - Trend Micro)
The decoded Base64 payload for Linux downloading the WAV file (Source – Trend Micro)

The decoded Base64 payload for Linux downloads the WAV file, decodes it, and executes the resulting payload.

The extraction process worked by reading the raw audio frames using Python’s wave module, then Base64-decoding the data and splitting it: the first 8 bytes acted as an XOR key, while the remaining bytes formed the encrypted payload.

Each byte was XORed against this rotating key to recover the cleartext harvester. This approach made static analysis of the package completely ineffective, since the actual stealing logic never resided in the code at all.

Base64 decode wrapper function (Source - Trend Micro)
Base64 decode wrapper function (Source – Trend Micro)

The malicious code was also split across three separate locations in _client.py, making it far harder to catch through a quick visual scan.

Linux orchestrator and harvester (Source - Trend Micro)
Linux orchestrator and harvester (Source – Trend Micro)

On Windows, the payload installed a disguised executable named msbuild.exe into the Startup folder for boot persistence.

Organizations should look for unexpected WAV file downloads from non-media IP addresses over port 8080, outbound HTTP requests carrying the X-Filename: tpcp.tar.gz header, and any msbuild.exe files appearing in user Startup directories.

All PyPI dependencies should be pinned by hash, and CI/CD pipelines should be actively monitored for unusual audio file downloads or unexpected outbound connections.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

npm Supply Chain Attack: undicy-http Depl Uses Deploy

Next Post

North Korean Hackers Infect Windows, macOS, Linux via Axios

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware & Extortion Groups Target Aviation & Aerospace
May 6, 2026
Vimeo Data Breach Exposes 119,000 Users Unique Email Addresses
May 6, 2026
Azure AD Conditional Access Bypass: Phantom Device PR
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us