TeamPCP Executes Sophisticated PyPI Supply Chain Attack
The TeamPCP threat group successfully compromised the official Telnyx package on the Python Package Index (PyPI) on March 27, 2026, uploading malicious versions that contain credential-stealing malware concealed within WAV audio files. This supply chain attack represents a significant escalation in the group's tactics, targeting the widely-used communications platform's Python SDK to reach developers and organizations integrating Telnyx services.
The attack was discovered when security researchers identified suspicious activity in the Telnyx package repository. The malicious versions maintained the same functionality as legitimate releases while secretly executing additional code that extracts and transmits sensitive credentials from infected systems. The attackers demonstrated sophisticated knowledge of Python packaging and distribution mechanisms, successfully bypassing initial security checks.
TeamPCP employed a novel steganographic technique by embedding the malicious payload inside seemingly innocuous WAV audio files included with the package. This approach allowed the malware to evade traditional static analysis tools that typically focus on executable code rather than media files. The WAV files appear legitimate to casual inspection but contain encoded malicious instructions that are extracted and executed during package installation or runtime.
The compromise affects multiple versions of the Telnyx package, with the malicious code designed to activate only after successful installation. Security researchers from Cyber Security News confirmed that the attack specifically targets developer credentials, API keys, and authentication tokens stored on compromised systems. The malware operates silently in the background, collecting sensitive information and transmitting it to command-and-control servers operated by the TeamPCP group.
Related: GlassWorm Supply Chain Attack Hits GitHub, npm, VSCode
Related: GitHub Accounts Breached in VS Code GlassWorm Aftermath
Related: Trivy Scanner Hit by Second Supply Chain Attack in Month
Python Developers and Telnyx Integration Users at Risk
The compromise directly impacts Python developers who have downloaded and installed the malicious Telnyx package versions from PyPI. Organizations using Telnyx's communication APIs through Python applications are particularly vulnerable, as the malware specifically targets credentials and API keys associated with telecommunications and messaging services. Development teams working on voice, SMS, or messaging applications that integrate Telnyx functionality face immediate risk of credential theft and potential unauthorized access to their communication infrastructure.
The attack scope extends beyond individual developers to include continuous integration and continuous deployment (CI/CD) pipelines that automatically pull dependencies from PyPI. Automated build systems that installed the compromised package versions may have inadvertently deployed the malware to production environments, potentially exposing customer data and internal systems. Enterprise development environments using package managers like pip or pipenv to manage dependencies are especially susceptible if they lack proper package verification mechanisms.
Security teams at organizations using Python-based applications should immediately audit their dependency management practices and review systems that may have installed the malicious Telnyx package. The credential-stealing capabilities of the malware pose significant risks to cloud infrastructure, database access, and third-party service integrations where stolen API keys could enable unauthorized access to sensitive resources and customer data.
Immediate Response and Mitigation Steps Required
Organizations must immediately audit all Python environments for the presence of compromised Telnyx package versions. System administrators should run 'pip list | grep telnyx' to identify installed versions and cross-reference them against the list of known malicious releases. Any systems found to contain the compromised package should be considered potentially infected and require immediate isolation from production networks until thorough security analysis can be completed.
The malware's steganographic approach using WAV files requires specialized detection techniques beyond standard antivirus scanning. Security teams should examine installed Telnyx packages for unexpected audio files and monitor network traffic for suspicious outbound connections to unknown domains. The Hacker News analysis indicates that the malware establishes encrypted communications channels to exfiltrate stolen credentials, making network monitoring crucial for identifying compromised systems.
Immediate remediation steps include uninstalling all Telnyx package versions using 'pip uninstall telnyx' and reinstalling only verified clean versions directly from official Telnyx repositories. Organizations should rotate all API keys, authentication tokens, and credentials that may have been accessible on affected systems. Database passwords, cloud service credentials, and third-party API keys require immediate rotation to prevent unauthorized access using stolen authentication materials.
Development teams should implement package integrity verification using tools like pip-audit and consider using private PyPI mirrors with enhanced security controls. The incident highlights the critical importance of supply chain security in Python development environments and the need for comprehensive dependency management policies that include regular security audits and automated vulnerability scanning of all third-party packages.




