Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

Backdoored Telnyx PyPI package pushes malware hidden in WAV audio
TeamPCP compromised the official Telnyx PyPI package by publishing backdoored versions 4.87.1 and 4.87.2 that install credential‑stealing malware hidden via steganography in WAV files and deploy second‑stage payloads to exfiltrate SSH keys, cloud tokens, wallets, and other secrets. Researchers (Aikido, Socket, Endor Labs) attribute the supply‑chain attack to TeamPCP, advise rolling back to Telnyx 4.87.0, treating any importer as fully compromised, and rotating all secrets immediately. #TeamPCP #Telnyx

Keypoints

  • TeamPCP published malicious Telnyx PyPI releases 4.87.1 and 4.87.2.
  • The backdoor triggers on import and delivers a steganographic WAV payload (ringtone.wav/hangup.wav) that executes in memory.
  • On Linux/macOS it steals SSH keys, credentials, cloud tokens, crypto wallets, and environment variables.
  • On Windows it extracts msbuild.exe into the Startup folder for persistence, and on Kubernetes it enumerates secrets and deploys privileged pods.
  • Developers should roll back to Telnyx 4.87.0, treat affected systems as fully compromised, and rotate all secrets immediately.

Read More: https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/