Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio
Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio
NEWS

Backdoored Telnyx PyPI Package Pushes Malware Hidden in WAV Audio

Threat actors known as TeamPCP compromised the Telnyx Python package on PyPI, uploading malicious versions that conceal credential-stealing malware inside a WAV audio file using steganographic techniques.

Dylan H.

News Desk

March 28, 2026
4 min read

Hackers known as TeamPCP have compromised the Telnyx package on the Python Package Index (PyPI), uploading backdoored versions that deliver credential-stealing malware concealed inside a WAV audio file. The attack represents a sophisticated supply chain compromise targeting developers and organizations using the popular Telnyx Python SDK for communications APIs.

What Is Telnyx

Telnyx is a cloud communications platform offering voice, SMS, fax, and data services via APIs. The telnyx Python package is the official SDK used by developers to integrate Telnyx's communications services into Python applications. It is widely used in SaaS products, call centers, healthcare communication platforms, and enterprises with programmatic telephony needs.

The Supply Chain Attack

TeamPCP gained access to the Telnyx PyPI account and uploaded malicious versions of the telnyx package. Developers who installed or upgraded the compromised version unwittingly pulled the backdoored package into their environments.

Malware Concealment via WAV Steganography

The backdoored package includes a WAV audio file that appears benign to casual inspection. However, the malicious payload — a credential-stealing malware — is hidden within the audio file using steganographic techniques. Steganography conceals data inside a carrier file (in this case audio) in a way that is not apparent to the naked eye and is designed to evade security tooling that scans for obvious malware signatures.

The package installs normally and may appear fully functional, reducing the likelihood that developers will immediately notice something is wrong. The WAV file is extracted and decoded at runtime to retrieve and execute the malware payload.

Credential Stealer Payload

Once the hidden malware is decoded from the WAV file and executed, it acts as a credential stealer targeting:

  • Environment variables — harvesting API keys, database credentials, and cloud provider tokens commonly stored in .env files or shell environments in developer workstations
  • Browser-stored credentials — passwords, session cookies, and stored logins from Chromium and Firefox-based browsers
  • SSH keys and configuration files — private keys and known hosts files that could enable lateral movement
  • Cloud provider configuration — AWS credentials (~/.aws/credentials), GCP service account keys, and Azure CLI tokens

Stolen credentials are exfiltrated to attacker-controlled infrastructure. In developer environments, these credentials often represent broad access to cloud infrastructure, CI/CD pipelines, source code repositories, and production systems.

Why PyPI Supply Chain Attacks Are High Impact

The telnyx package attack follows a pattern of supply chain compromises targeting PyPI and other package registries. Developers implicitly trust packages they install from official registries, and package installation often occurs in automated pipelines (CI/CD), meaning the malicious code may execute in highly privileged environments without direct human observation.

Developer machine compromises via supply chain attacks are particularly valuable to threat actors because:

  • Developer workstations typically hold credentials to numerous high-value systems
  • Code signing keys and deployment credentials may be accessible
  • Source code and intellectual property can be exfiltrated
  • Pivoting from a compromised developer machine into cloud infrastructure is often straightforward

TeamPCP

TeamPCP is a threat actor group observed conducting supply chain attacks against the Python ecosystem via PyPI. The group has previously been linked to campaigns targeting communications and developer tooling packages. Their use of steganography to conceal payloads within audio files is a notable evolution in their obfuscation tradecraft, making detection by static analysis tools more difficult.

What Affected Developers Should Do

Any developer or organization using the telnyx Python package should take immediate action:

  1. Check installed version — Verify which version of the telnyx package is installed in your environment (pip show telnyx)
  2. Check for malicious versions — Consult PyPI advisories or the Telnyx GitHub repository for the list of known-compromised version numbers
  3. Remove and reinstall — Uninstall the package and reinstall only a verified clean version
  4. Rotate all credentials — Assume any credentials accessible from the environment where the package was installed are compromised: API keys, cloud credentials, database passwords, SSH keys, and browser-stored passwords
  5. Audit CI/CD pipelines — If the package was used in automated build or deployment pipelines, treat all credentials used in those pipelines as compromised and rotate them immediately
  6. Scan for indicators — Use endpoint detection tools to scan for malware indicators associated with this campaign

Broader Defence Against PyPI Supply Chain Attacks

  • Pin package versions in requirements.txt or pyproject.toml and use hash verification to detect unexpected changes
  • Use private package mirrors with package validation for production environments
  • Monitor PyPI advisories and subscribe to security alerts for packages in your dependency tree
  • Apply least privilege to environments where packages are installed — limit the credentials accessible from build and dev environments

Source: BleepingComputer

#Malware#Supply Chain#PyPI#Steganography#Infostealer#Python#BleepingComputer

Related Articles

New Infinity Stealer Malware Grabs macOS Data via ClickFix Lures

A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler, delivered through deceptive ClickFix browser-fix lure campaigns.

5 min read

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

The TeamPCP threat actor — behind previous supply chain attacks on Trivy, KICS, and litellm — has now compromised the telnyx Python package on PyPI, embedding a credential-stealing payload hidden inside WAV audio files.

4 min read

Supply Chain Attack Hits Widely-Used AI Package, Risking Thousands of Companies

Malicious versions of LiteLLM — a Python package with 3 million daily downloads present in roughly 36% of cloud environments — were quietly pushed to PyPI...

5 min read
Back to all News