HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Malicious Telnyx PyPI Packages Distributed by TeamPCP Enable Credential Harvesting via Hidden WAV Stealer

TeamPCP uploaded two compromised versions of the Telnyx Python SDK to PyPI, embedding a credential‑stealing payload inside a .WAV file. The malicious code activates when the package is imported, putting any organization that relies on Telnyx for communications at risk of API key and secret exfiltration.

🛡️ LiveThreat™ Intelligence · 📅 March 28, 2026· 📰 thehackernews.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

TeamPCP Distributes Malicious Telnyx PyPI Packages, Embeds Credential Stealer in WAV Files

What Happened — On March 27 2026, the threat actor known as TeamPCP published two compromised versions (4.87.1 and 4.87.2) of the telnyx Python package to the Python Package Index (PyPI). The malicious code hides a credential‑harvesting stealer inside a seemingly innocuous .WAV file, which is executed when the package is imported.

Why It Matters for TPRM

  • Supply‑chain compromise of a widely used communications API can expose downstream customers to credential theft.
  • PyPI is a trusted source; malicious uploads erode confidence in third‑party code repositories.
  • Organizations that integrate Telnyx for voice, messaging, or verification services may inadvertently exfiltrate API keys, user data, and internal secrets.

Who Is Affected — Technology SaaS providers, telecom/communications platforms, and any enterprise that incorporates the Telnyx Python SDK into production workloads.

Recommended Actions

  • Immediately audit all environments for the malicious telnyx versions and replace them with a clean release.
  • Enforce strict package‑allow‑list policies and use signed packages where possible.
  • Rotate any Telnyx API credentials that may have been exposed and monitor for anomalous usage.

Technical Notes — The malicious payload is concealed in a .WAV audio file that is decoded and executed at runtime, leveraging Python’s dynamic import mechanisms. No CVE is associated; the attack exploits trust in the PyPI supply chain. Data types at risk include API keys, authentication tokens, and any secrets stored in environment variables accessed by the compromised package. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.