Telnyx Python SDK Compromised to Deliver Credential-Stealing Malware
A supply chain attack affecting the telnyx Python package on PyPI has been identified. Malicious versions 4.87.1 and 4.87.2 contained embedded credential-harvesting malware. The attack employs a three-stage runtime chain on Linux/macOS using audio steganography for delivery, in-memory execution of a data harvester, and encrypted exfiltration. On Windows, it drops a persistent binary in the Startup folder. The malware uses sophisticated techniques including fileless execution, hybrid encryption, and anti-forensics measures. The threat actor, TeamPCP, demonstrates high operational security and cryptographic awareness. Developers are advised to audit environments, rotate credentials, and check for indicators of compromise.
AI Analysis
Technical Summary
This threat involves a supply chain compromise of the Telnyx Python SDK distributed via PyPI, affecting malicious versions 4.87.1 and 4.87.2. The attacker, TeamPCP, embedded credential-harvesting malware within these versions. On Linux and macOS platforms, the malware executes a complex three-stage runtime chain: first, it uses audio steganography by downloading WAV files (e.g., ringtone.wav and hangup.wav) from a remote server (IP 83.142.209.203) to covertly deliver the payload. Next, it performs in-memory execution of a data harvester to avoid writing malicious files to disk, enhancing stealth. Finally, it exfiltrates harvested credentials using hybrid encryption to evade network detection and ensure confidentiality. On Windows systems, the malware drops a persistent binary in the Startup folder to maintain persistence across reboots. The malware incorporates fileless execution techniques, hybrid cryptographic methods, and anti-forensics measures to complicate detection and analysis. The adversary's operational security is high, indicating a well-resourced and skilled actor. Although no CVE or public exploits are currently known, the attack exemplifies the dangers of compromised dependencies in software supply chains, especially in widely used development libraries like those on PyPI. The attack leverages multiple MITRE ATT&CK techniques including credential access, execution, persistence, defense evasion, and command and control.
Potential Impact
The compromise of the Telnyx Python SDK poses significant risks to organizations globally that rely on this package for telecommunication services or integrations. Credential harvesting can lead to unauthorized access to critical systems, data breaches, and lateral movement within networks. The use of fileless execution and encrypted exfiltration increases the difficulty of detection and response, potentially allowing prolonged attacker presence. On Windows, persistence mechanisms may enable long-term control over affected hosts. The supply chain nature means that even organizations with strong perimeter defenses can be impacted if they consume the compromised package. This can result in operational disruption, loss of sensitive information, reputational damage, and financial costs associated with incident response and remediation. The sophisticated techniques used suggest the threat actor is capable of targeted, stealthy intrusions, raising concerns for sectors with high-value data or critical infrastructure dependencies on the Telnyx SDK.
Mitigation Recommendations
Organizations should immediately verify the versions of the Telnyx Python SDK in use and remove or replace versions 4.87.1 and 4.87.2 with known clean releases. Conduct thorough audits of development and production environments for signs of compromise, including unusual network traffic to IP 83.142.209.203 or related URLs serving audio files. Employ endpoint detection tools capable of identifying fileless execution and monitor for persistence mechanisms, especially on Windows startup folders. Rotate all credentials and secrets that may have been exposed, including API keys and service account credentials. Implement strict supply chain security practices such as verifying package integrity via checksums or signatures, using dependency scanning tools, and restricting package installation to vetted sources. Enhance network monitoring to detect encrypted exfiltration attempts and anomalous outbound connections. Educate developers on the risks of supply chain attacks and encourage use of virtual environments and containerization to isolate dependencies. Finally, maintain incident response readiness to quickly contain and remediate infections.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Japan, South Korea
Indicators of Compromise
- ip: 83.142.209.203
- url: http://83.142.209.203:8080/ringtone.wav
- url: http://83.142.209.203:8080/hangup.wav
Telnyx Python SDK Compromised to Deliver Credential-Stealing Malware
Description
A supply chain attack affecting the telnyx Python package on PyPI has been identified. Malicious versions 4.87.1 and 4.87.2 contained embedded credential-harvesting malware. The attack employs a three-stage runtime chain on Linux/macOS using audio steganography for delivery, in-memory execution of a data harvester, and encrypted exfiltration. On Windows, it drops a persistent binary in the Startup folder. The malware uses sophisticated techniques including fileless execution, hybrid encryption, and anti-forensics measures. The threat actor, TeamPCP, demonstrates high operational security and cryptographic awareness. Developers are advised to audit environments, rotate credentials, and check for indicators of compromise.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain compromise of the Telnyx Python SDK distributed via PyPI, affecting malicious versions 4.87.1 and 4.87.2. The attacker, TeamPCP, embedded credential-harvesting malware within these versions. On Linux and macOS platforms, the malware executes a complex three-stage runtime chain: first, it uses audio steganography by downloading WAV files (e.g., ringtone.wav and hangup.wav) from a remote server (IP 83.142.209.203) to covertly deliver the payload. Next, it performs in-memory execution of a data harvester to avoid writing malicious files to disk, enhancing stealth. Finally, it exfiltrates harvested credentials using hybrid encryption to evade network detection and ensure confidentiality. On Windows systems, the malware drops a persistent binary in the Startup folder to maintain persistence across reboots. The malware incorporates fileless execution techniques, hybrid cryptographic methods, and anti-forensics measures to complicate detection and analysis. The adversary's operational security is high, indicating a well-resourced and skilled actor. Although no CVE or public exploits are currently known, the attack exemplifies the dangers of compromised dependencies in software supply chains, especially in widely used development libraries like those on PyPI. The attack leverages multiple MITRE ATT&CK techniques including credential access, execution, persistence, defense evasion, and command and control.
Potential Impact
The compromise of the Telnyx Python SDK poses significant risks to organizations globally that rely on this package for telecommunication services or integrations. Credential harvesting can lead to unauthorized access to critical systems, data breaches, and lateral movement within networks. The use of fileless execution and encrypted exfiltration increases the difficulty of detection and response, potentially allowing prolonged attacker presence. On Windows, persistence mechanisms may enable long-term control over affected hosts. The supply chain nature means that even organizations with strong perimeter defenses can be impacted if they consume the compromised package. This can result in operational disruption, loss of sensitive information, reputational damage, and financial costs associated with incident response and remediation. The sophisticated techniques used suggest the threat actor is capable of targeted, stealthy intrusions, raising concerns for sectors with high-value data or critical infrastructure dependencies on the Telnyx SDK.
Mitigation Recommendations
Organizations should immediately verify the versions of the Telnyx Python SDK in use and remove or replace versions 4.87.1 and 4.87.2 with known clean releases. Conduct thorough audits of development and production environments for signs of compromise, including unusual network traffic to IP 83.142.209.203 or related URLs serving audio files. Employ endpoint detection tools capable of identifying fileless execution and monitor for persistence mechanisms, especially on Windows startup folders. Rotate all credentials and secrets that may have been exposed, including API keys and service account credentials. Implement strict supply chain security practices such as verifying package integrity via checksums or signatures, using dependency scanning tools, and restricting package installation to vetted sources. Enhance network monitoring to detect encrypted exfiltration attempts and anomalous outbound connections. Educate developers on the risks of supply chain attacks and encourage use of virtual environments and containerization to isolate dependencies. Finally, maintain incident response readiness to quickly contain and remediate infections.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://socket.dev/blog/telnyx-python-sdk-compromised"]
- Adversary
- TeamPCP
- Pulse Id
- 69c785cfafa051ecd9a83cd7
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip83.142.209.203 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://83.142.209.203:8080/ringtone.wav | — | |
urlhttp://83.142.209.203:8080/hangup.wav | — |
Threat ID: 69ca4b8fe6bfc5ba1d0d7d0f
Added to database: 3/30/2026, 10:08:15 AM
Last enriched: 3/30/2026, 10:23:48 AM
Last updated: 3/31/2026, 6:13:03 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.