<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">

Telnyx Python SDK Hit by Expanding TeamPCP Supply Chain Attack

Telnyx Python SDK hit by TeamPCP attack, infecting thousands. Users must rotate credentials to protect their systems now.
Content Team

The popular Telnyx Python SDK became the latest victim of TeamPCP's ongoing supply chain attack campaign that began March 19. Two malicious versions (4.87.1 and 4.87.2) were uploaded to PyPI, targeting Windows, macOS, and Linux systems. The library, which has over 670,000 monthly downloads, enables cloud-based voice solutions.

The attack uses a clever technique: hiding malicious code inside valid WAV audio files that pass security checks. On Windows, it drops executables in startup folders, while on macOS and Linux, it runs scripts to steal session keys. All stolen data gets encrypted with RSA encryption matching previous TeamPCP attacks.

Users who installed these versions should assume their machines are compromised and immediately rotate all credentials, API keys, and SSH keys. GitGuardian estimates the campaign has affected over 470 repositories and 1,900 packages, with the actual scope likely much larger when considering private repositories.

Source: Security Week

Share this article
Share on facebook Share on linkedin Share on twitter Share on email
blog_book_a_demo_cta_3x
Have questions about protecting your software?
Our escrow experts are standing by to help.
Book a free demo