Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM

0
Medium
Published: Mon Mar 30 2026 (03/30/2026, 18:06:14 UTC)
Source: AlienVault OTX General

Description

TeamPCP conducted a sophisticated supply-chain attack by publishing malicious versions (4. 87. 1 and 4. 87. 2) of the Telnyx Python SDK on PyPI. The attack uses advanced techniques such as WAV-based audio steganography to hide malicious code, split-file code injection for evasion, and supports Linux, macOS, and Windows platforms. Upon import, the malicious payload downloads and executes credential-stealing malware, with Windows targets persisting via the Startup folder. The attackers shifted from HTTPS to plaintext HTTP for command and control, increasing exposure to network monitoring. Organizations using the Telnyx SDK are advised to downgrade to the last known clean version and treat potentially affected systems as compromised. No CVSS score is assigned, but the threat is assessed as high severity due to multi-platform credential theft and stealthy evasion methods.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 21:53:25 UTC

Technical Analysis

The TeamPCP threat actor group executed a sophisticated supply-chain attack targeting the Telnyx Python SDK by publishing malicious versions 4.87.1 and 4.87.2 on the PyPI repository. This campaign marks a tactical evolution from their earlier LiteLLM campaign, incorporating advanced evasion and persistence techniques. The malicious payload is activated immediately upon import of the compromised SDK, leveraging WAV-based steganography to conceal malicious code within audio files, thereby complicating detection by traditional static and dynamic analysis tools. Additionally, the attack employs split-file code injection, distributing the malicious logic across multiple source files to evade signature-based detection and complicate forensic analysis. The payload supports multiple operating systems—Linux, macOS, and Windows—broadening the attack surface. On Windows, persistence is achieved through the Startup folder, ensuring execution on system reboot. The payload downloads and executes credential-stealing malware designed to exfiltrate sensitive authentication data, posing a significant risk to user accounts and organizational security. Notably, the attackers transitioned their command and control infrastructure from encrypted HTTPS to plaintext HTTP, which may inadvertently expose their activities to network defenders but could also indicate operational trade-offs or attempts to blend with benign traffic. Given the nature of the supply-chain compromise, any organization relying on the Telnyx Python SDK versions 4.87.1 or 4.87.2 is at risk. The absence of a CVSS score necessitates an independent severity assessment, which is high due to the multi-platform credential theft capabilities, stealthy evasion, and persistence mechanisms. Indicators of compromise include several file hashes and an IP address (83.142.209.203) associated with the campaign. Organizations are strongly advised to revert to the last known clean SDK version and conduct thorough incident response procedures to identify and remediate any compromise.

Potential Impact

This supply-chain attack threatens organizations worldwide that use the Telnyx Python SDK, potentially compromising sensitive credentials across Linux, macOS, and Windows environments. Credential theft can lead to unauthorized access to critical systems, data breaches, lateral movement within networks, and further malware deployment. The multi-platform nature increases the scope of affected systems, including development, production, and CI/CD environments. The use of advanced evasion techniques such as audio steganography and split-file injection complicates detection and forensic efforts, increasing dwell time and risk of extensive compromise. Persistence on Windows systems via the Startup folder ensures malware survival across reboots, facilitating long-term access. The shift to plaintext HTTP C2 traffic could allow network defenders to detect and disrupt communications, but also indicates attackers’ confidence or operational constraints. The attack undermines trust in open-source supply chains, potentially impacting software development workflows and increasing operational costs due to remediation and incident response. Organizations may face regulatory and reputational damage if credential theft leads to data breaches or service disruptions.

Mitigation Recommendations

1. Immediately downgrade the Telnyx Python SDK to the last known clean version prior to 4.87.1 and 4.87.2 to prevent further exposure. 2. Conduct comprehensive endpoint and network forensics to identify any signs of compromise, focusing on the presence of the identified malicious hashes and suspicious network traffic to IP 83.142.209.203. 3. Implement enhanced monitoring for unusual process behaviors, especially those involving audio file processing or unexpected network connections over plaintext HTTP. 4. Audit Windows systems for unauthorized persistence mechanisms, particularly in the Startup folder, and remove any suspicious entries. 5. Employ advanced threat detection tools capable of analyzing steganographic content and split-file injection patterns to improve detection capabilities. 6. Rotate all potentially compromised credentials and enforce multi-factor authentication to limit attacker access. 7. Educate development and DevOps teams on supply-chain risks and enforce strict package version controls and integrity verification (e.g., hash checks, signed packages). 8. Utilize network segmentation and egress filtering to limit malware communication channels. 9. Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics from TeamPCP. 10. Consider deploying runtime application self-protection (RASP) or behavior-based anomaly detection within critical environments to detect malicious SDK behavior in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/c/teampcp-telnyx-attack-marks-a-shift-in-tactics.html"]
Adversary
TeamPCP
Pulse Id
69cabb96c63dbeb412355267
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5870a0bf82bbdf2687d8dce89dfa668f
hash4ce6ad55d8912aacc4ae4c572237131d0b7ba4b5
hash23b1ec58649170650110ecad96e5a9490d98146e105226a16d898fbe108139e5
hash7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9
hashab4c4aebb52027bf3d2f6b2dcef593a1a2cff415774ea4711f7d6e0aa1451d4e
hashcd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3

Ip

ValueDescriptionCopy
ip83.142.209.203

Threat ID: 69caed48e6bfc5ba1d70eba9

Added to database: 3/30/2026, 9:38:16 PM

Last enriched: 3/30/2026, 9:53:25 PM

Last updated: 3/31/2026, 6:45:52 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses