Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Ringing in Chaos: How TeamPCP Weaponized the Telnyx Python SDK

0
Medium
Published: Tue Mar 31 2026 (03/31/2026, 16:14:18 UTC)
Source: AlienVault OTX General

Description

TeamPCP conducted a supply chain attack by uploading malicious versions of the Telnyx Python SDK to PyPI, a package with approximately 750,000 monthly downloads. The attack uses a multi-stage approach involving a trojanized package that triggers a platform-specific loader, which then downloads a second-stage payload hidden via steganography in a WAV file. This payload deploys a credential harvester that steals, encrypts, and exfiltrates credentials to the attacker’s command and control server. The attack targets multiple major operating systems and can spread laterally through Kubernetes clusters. It is part of a broader campaign targeting multiple packages over nine days, employing advanced evasion and persistence techniques including steganography, hybrid encryption, and a full-featured RAT on Windows. No official patch or remediation guidance is provided in the available data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/08/2026, 11:21:17 UTC

Technical Analysis

The threat involves a supply chain compromise of the Telnyx Python SDK on PyPI by the adversary TeamPCP. The malicious package initiates a three-stage attack: first, a trojanized SDK triggers a platform-specific loader; second, a payload hidden in a WAV file via steganography is downloaded; third, a credential harvester is deployed that collects and encrypts credentials before exfiltration. The attack supports multiple operating systems and propagates through Kubernetes clusters. It features sophisticated techniques such as WAV and PNG steganography, hybrid encryption, Kubernetes lateral movement, and a Windows RAT with evasion capabilities. This campaign affected multiple packages over a nine-day period and is part of a broader supply chain attack strategy.

Potential Impact

The attack compromises a widely used Python SDK, potentially affecting a large number of users who download and use the package. It results in credential theft through a multi-stage payload delivery mechanism, enabling attackers to harvest sensitive credentials, encrypt them, and exfiltrate to their command and control infrastructure. The attack can propagate across Kubernetes clusters, increasing its potential impact in cloud-native environments. The presence of a full-featured RAT on Windows with advanced evasion techniques further increases the risk of persistent compromise and unauthorized access.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Users should verify the integrity of the Telnyx Python SDK package and avoid using versions from untrusted sources. It is recommended to monitor official Telnyx and PyPI advisories for updates or patches. Organizations should consider implementing supply chain security measures such as package signing verification and restricting installation of unverified packages. Given the complexity and sophistication of the attack, incident response should focus on identifying and removing the trojanized package and any deployed payloads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hexastrike.com/resources/blog/threat-intelligence/ringing-in-chaos-how-teampcp-weaponized-the-telnyx-python-sdk"]
Adversary
TeamPCP
Pulse Id
69cbf2da3eb58fb6304be93b
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip45.148.10.212
ip83.142.209.11
ip83.142.209.203

Hash

ValueDescriptionCopy
hash05bacbe163ef0393c2416cbd05e45e74
hash2e3a4412a7a487b32c5715167c755d08
hash331ab9c032cf95c89d877ee05b46f8d8
hash4467de8f6d521d6fc6a930fa8ede7017
hash5870a0bf82bbdf2687d8dce89dfa668f
hash7d231e938774127ba7487061ebc51e74
hash97e073abd819d9cdc07705aeaa481f59
hashb1c6036b046bcf8c80601742ebcc61b0
hashd2210feb0438c0ce89b5579ef75ae4d4
hashd528effabbd9cd66aaa11bc8777bb110
hash3fcc7360a2738ad2656e17c7d4ed3e651ff7d73a
hash42f7861818214222efeadb2fc826dda1cdc90050
hash4ce6ad55d8912aacc4ae4c572237131d0b7ba4b5
hash512efdfc832b012677341d251670c7192c463b21
hash78cd382040eda14e2f8a17ee7387cffdabe96ab5
hash85e16077deeaffae3c50d45d99e9dae2c58de53e
hashe866b3fa9f87a084b610272580428761e28ad65a
hasheee517fe8da4eddf7ead1d01a32606e6beec1adc
hash196b5e0e06424a02e360e28e08d7dcfab7ec8946af9477ca352c6cf6b7d4e9bd
hash23b1ec58649170650110ecad96e5a9490d98146e105226a16d898fbe108139e5
hash485952ba5347aa83f00537a4be0bebb274021f773a0203b65142f1b86dfda34d
hash4eceb569b4330565b93058465beab0e6d5ea09cfba8e7f29d7be1b5a2abd958a
hash5ce544a8db5d0b0953c966384858e4e8a017e7acba2f5f6d0ac8f529d59939d8
hash6cf223aea68b0e8031ff68251e30b6017a0513fe152e235c26f248ba1e15c92a
hash7290353a3bc2b18e9ea574d3294b09e28edaa6b038285bb101cf09760f187dcd
hash7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9
hash8395c3268d5c5dbae1c7c6d4bb3c318c752ba4608cfcd90eb97ffb94a910eac2
hash84edce66f09c55bbb44754411bde4b092288d172734df62fac20d6f794b3a2ec
hash8eaf4c4d0b82620bcda29b97896e2da0a754205c035721479f7ceafb817e4466
hasha585277a67a176fe098edf90986670653a5039e03e4028d18dd0b607ed287caa
hasha9235c0eb74a8e92e5a0150e055ee9dcdc6252a07785b6677a9ca831157833a5
hashab4c4aebb52027bf3d2f6b2dcef593a1a2cff415774ea4711f7d6e0aa1451d4e
hashbc40e5e2c438032bac4dec2ad61eedd4e7c162a8b42004774f6e4330d8137ba8
hashcd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3
hashcd6af6c9ba149673ff89a1f1ccc8ec40a265a3b54ad455fbef28dc2967a98e45
hashd29deee2e8bec85d2fcaec427f17d677f7de4f8387e00566b0b45ff81157bd31
hashd2a0d5f564628773b6af7b9c11f6b86531a875bd2d186d7081ab62748a800ebb
hashd6fc0ff06978742a2ef789304bcdbe69a731693ad066a457db0878279830d6a9
hashe4e3b176c1255666024d90392e09466a23bf6e8740bf589c6d1ccf2dfff451a4
hashe6912e3ec58120bf63edf2e4be6ff2f092c40cfbc655a12f4a463b2ef98d368e
hashf66c1ea3b25ec95d0c6a07be92c761551e543a7b256f9c78a2ff781c77df7093

Domain

ValueDescriptionCopy
domainaquasecurtiy.org
domainscan.aquasecurtiy.org
domaintdtqy-oyaaa-aaaae-af2dq-cai.raw.icp0.io

Threat ID: 69d636951cc7ad14da612bca

Added to database: 4/8/2026, 11:05:57 AM

Last enriched: 4/8/2026, 11:21:17 AM

Last updated: 4/9/2026, 4:49:27 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses