LIVE NEWS
  • Navy to mothball USS Boise, capping off years of maintenance challenges
  • NASA’s Artemis II mission was a historic success
  • US and Iran hold talks in Islamabad as Pakistan seeks to broker peace deal | US-Israel war on Iran
  • Ethereum Foundation Sells $11M Worth of ETH as Price Prepares for ‘Last Pump’
  • I stopped guessing which AA batteries are dead – this charging station keeps them in check for me
  • How market’s private credit crisis fears are spreading to bond ETFs
  • Putting humans at the centre: UN AI panel begins work on global impact study
  • South Korea’s AI industrial policy meets the energy shock
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Backdoored Telnyx PyPI package pushes malware hidden in WAV audio
Cybersecurity

Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

primereportsBy primereportsMarch 28, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Backdoored Telnyx PyPI package pushes malware hidden in WAV audio
Share
Facebook Twitter LinkedIn Pinterest Email


Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file.

The supply-chain attack was observed by application security firms Aikido, Socket, and Endor Labs, and was attributed to TeamPCP based on the same exfiltration pattern and RSA key seen in previous incidents caused by the same actor.

TeamPCP is responsible for multiple recent supply-chain (e.g., Aqua Security’s Trivy vulnerability scanner, the open-source Python library LiteLLM) and wiper attacks targeting Iranian systems.

Earlier today, the threat actor published backdoored versions of the Telnyx package 4.87.1 and 4.87.2. On Linux and macOS, the malicious version drops malware that steals SSH keys, credentials, cloud tokens, cryptocurrency wallets, environment variables, and other types of secrets.

On Windows, the malware is dropped for persistence in the startup folder, running on every login.

The Telnyx PyPI package is the official Python software development kit (SDK) that allows developers to integrate Telnyx communication services like VoIP, messaging (SMS, MMS, WhatsApp), fax, and IoT connectivity into their applications.

The package is very popular, having over 740,000 downloads per month on PyPI.

Security researchers believe that the hackers breached the project using stolen credentials for the publishing account on the PyPI registry.

Initially, TeamPCP published Telnyx version 4.87.1 at 03:51 UTC, but the package had a malicious yet non-functioning payload. The threat actor corrected the error about an hour later at 04:07 UTC by publishing Telnyx version 4.87.2.

The malicious code is contained in the ‘telnyx/_client.py’ file, which triggers automatically at import, while allowing the legitimate SDK classes to function as expected.

On Linux and macOS systems, the payload spawns a detached process that downloads a second-stage disguised as a WAV audio file (ringtone.wav) from a remote command-and-control (C2) server.

Function handling the steganographic file
Function handling the steganographic file
Source: Endor Labs

By using steganography, the threat actor embedded malicious code in the file’s data frames without altering the audio. The payload is extracted using a simple XOR-based decryption routine and executes in memory to harvest sensitive data from the infected host.

If Kubernetes is running on the machine, the malware enumerates cluster secrets and deploys privileged pods across nodes, attempting to access the underlying host systems.

On Windows systems, the malware downloads a different WAV file (hangup.wav) that extracts an executable named msbuild.exe.

The executable is placed in the Startup folder for persistence across system reboots, while a lock file limits repeated execution within 12-hour windows.

The researchers warn that Telnyx SDK version 4.87.0 is the clean variant that includes the legitimate Telnyx code with no alterations. Developers are strongly advised to roll back to this release if they find Telnyx version 4.87.1 and 4.87.2 in their environments.

Any system that imported the malicious package versions should be treated as fully compromised, as the payload executes at runtime and may have already exfiltrated sensitive data. In such occurrences, it is recommended to rotate all secrets as soon as possible.


tines

Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleI Moved From Texas to Italy to Retire and Am Saving $20k on Healthcare
Next Article Second Senate Bill Targeting Prediction Market Insider Trading
primereports
  • Website

Related Posts

Cybersecurity

I stopped guessing which AA batteries are dead – this charging station keeps them in check for me

April 11, 2026
Cybersecurity

ChatGPT rolls out new $100 Pro subscription to challenge Claude

April 11, 2026
Cybersecurity

Hims Breach Exposes the Most Sensitive Kinds of PHI

April 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Navy to mothball USS Boise, capping off years of maintenance challenges
  • NASA’s Artemis II mission was a historic success
  • US and Iran hold talks in Islamabad as Pakistan seeks to broker peace deal | US-Israel war on Iran
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.