TeamPCP Injects Malware into Telnyx Python Package Using Audio Steganography

A new supply chain attack has been identified in which the threat group TeamPCP compromised the official Telnyx Python package on the Python Package Index (PyPI), distributing malicious versions designed to steal sensitive data. The affected versions, 4.87.1 and 4.87.2, were published on March 27, 2026, and have since been quarantined after the discovery of embedded malware.

The malicious code was inserted into the package’s core file and is triggered automatically when developers import the library into their applications. Unlike typical attacks that rely on installation scripts, this method ensures the malware executes silently during runtime, making it harder to detect. The compromised package targets multiple operating systems, including Windows, Linux, and macOS.

A notable aspect of the attack is the use of audio steganography to conceal the malicious payload. Instead of delivering a conventional executable, the attackers hid the malware within .WAV audio files downloaded from a command-and-control server. These files appear legitimate but contain encoded scripts that extract and execute credential-harvesting programs, enabling attackers to evade standard security detection mechanisms.

On Windows systems, the malware downloads a file named “hangup.wav,” extracts an executable, and places it in the system’s startup directory to ensure persistence across reboots. On Linux and macOS systems, a similar process is used with a different audio file, leading to the execution of a multi-stage attack that collects credentials and exfiltrates them to a remote server in encrypted form.

The credential harvesting component is designed to capture a wide range of sensitive information, including SSH keys, cloud credentials, API tokens, environment variables, and even cryptocurrency wallet data. In some cases, the malware can also exploit cloud services and perform lateral movement within Kubernetes environments, significantly increasing the potential impact of the breach.

Security researchers believe the compromise may be linked to previously stolen publishing credentials, possibly obtained through earlier attacks in the same campaign targeting developer tools and CI/CD pipelines. The incident is part of a broader, ongoing operation by TeamPCP that has affected multiple widely used software packages.

Developers are strongly advised to audit their environments for the affected versions, downgrade to a safe release, rotate all credentials, and block known malicious domains associated with the attack. The incident highlights growing risks in software supply chains, especially as attackers increasingly target widely used open-source components to infiltrate enterprise systems.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch