Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Telnyx Python SDK Compromised to Deliver Credential-Stealing Malware

0
Medium
Published: Sat Mar 28 2026 (03/28/2026, 07:39:59 UTC)
Source: AlienVault OTX General

Description

A supply chain attack affecting the telnyx Python package on PyPI has been identified. Malicious versions 4.87.1 and 4.87.2 contained embedded credential-harvesting malware. The attack employs a three-stage runtime chain on Linux/macOS using audio steganography for delivery, in-memory execution of a data harvester, and encrypted exfiltration. On Windows, it drops a persistent binary in the Startup folder. The malware uses sophisticated techniques including fileless execution, hybrid encryption, and anti-forensics measures. The threat actor, TeamPCP, demonstrates high operational security and cryptographic awareness. Developers are advised to audit environments, rotate credentials, and check for indicators of compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 10:23:48 UTC

Technical Analysis

This threat involves a supply chain compromise of the Telnyx Python SDK distributed via PyPI, affecting malicious versions 4.87.1 and 4.87.2. The attacker, TeamPCP, embedded credential-harvesting malware within these versions. On Linux and macOS platforms, the malware executes a complex three-stage runtime chain: first, it uses audio steganography by downloading WAV files (e.g., ringtone.wav and hangup.wav) from a remote server (IP 83.142.209.203) to covertly deliver the payload. Next, it performs in-memory execution of a data harvester to avoid writing malicious files to disk, enhancing stealth. Finally, it exfiltrates harvested credentials using hybrid encryption to evade network detection and ensure confidentiality. On Windows systems, the malware drops a persistent binary in the Startup folder to maintain persistence across reboots. The malware incorporates fileless execution techniques, hybrid cryptographic methods, and anti-forensics measures to complicate detection and analysis. The adversary's operational security is high, indicating a well-resourced and skilled actor. Although no CVE or public exploits are currently known, the attack exemplifies the dangers of compromised dependencies in software supply chains, especially in widely used development libraries like those on PyPI. The attack leverages multiple MITRE ATT&CK techniques including credential access, execution, persistence, defense evasion, and command and control.

Potential Impact

The compromise of the Telnyx Python SDK poses significant risks to organizations globally that rely on this package for telecommunication services or integrations. Credential harvesting can lead to unauthorized access to critical systems, data breaches, and lateral movement within networks. The use of fileless execution and encrypted exfiltration increases the difficulty of detection and response, potentially allowing prolonged attacker presence. On Windows, persistence mechanisms may enable long-term control over affected hosts. The supply chain nature means that even organizations with strong perimeter defenses can be impacted if they consume the compromised package. This can result in operational disruption, loss of sensitive information, reputational damage, and financial costs associated with incident response and remediation. The sophisticated techniques used suggest the threat actor is capable of targeted, stealthy intrusions, raising concerns for sectors with high-value data or critical infrastructure dependencies on the Telnyx SDK.

Mitigation Recommendations

Organizations should immediately verify the versions of the Telnyx Python SDK in use and remove or replace versions 4.87.1 and 4.87.2 with known clean releases. Conduct thorough audits of development and production environments for signs of compromise, including unusual network traffic to IP 83.142.209.203 or related URLs serving audio files. Employ endpoint detection tools capable of identifying fileless execution and monitor for persistence mechanisms, especially on Windows startup folders. Rotate all credentials and secrets that may have been exposed, including API keys and service account credentials. Implement strict supply chain security practices such as verifying package integrity via checksums or signatures, using dependency scanning tools, and restricting package installation to vetted sources. Enhance network monitoring to detect encrypted exfiltration attempts and anomalous outbound connections. Educate developers on the risks of supply chain attacks and encourage use of virtual environments and containerization to isolate dependencies. Finally, maintain incident response readiness to quickly contain and remediate infections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/telnyx-python-sdk-compromised"]
Adversary
TeamPCP
Pulse Id
69c785cfafa051ecd9a83cd7
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip83.142.209.203

Url

ValueDescriptionCopy
urlhttp://83.142.209.203:8080/ringtone.wav
urlhttp://83.142.209.203:8080/hangup.wav

Threat ID: 69ca4b8fe6bfc5ba1d0d7d0f

Added to database: 3/30/2026, 10:08:15 AM

Last enriched: 3/30/2026, 10:23:48 AM

Last updated: 3/31/2026, 6:13:03 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses