URL has been copied successfully!
TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data.The two versions, 4.87.1 and 4.87.2, published to the Python Package Index (PyPI) repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file. Users are

First seen on thehackernews.com

Jump to article: thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link