Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Telnyx Package Poisoning: A New Twist on PyPI Supply-Chain Compromise




A recent attack on the Python Software Development Library (PyPI) supply chain has highlighted the ongoing risks posed by compromised software packages. Researchers have identified a new exploit, dubbed "TeamPCP," which compromised a legitimate package, Telnyx, and replaced it with malicious releases containing multi-stage infostealers and persistence mechanisms. This incident underscores the need for greater vigilance and monitoring within the PyPI community.

  • Researchers have identified a new attack vector targeting the Python Software Development Library (PyPI) supply chain.
  • A legitimate software package, Telnyx, was compromised and replaced with malicious releases containing multi-stage infostealers and persistence mechanisms.
  • The attackers are believed to be based in Eastern Europe or Russia and used social engineering tactics and exploits to gain access to the Telnyx package repository on PyPI.
  • The attack highlights the ongoing risks posed by compromised software packages on PyPI, which has over 34,000 downloads per week.
  • Developers and users are advised to remain vigilant and take steps to protect themselves against these types of attacks.



  • In a recent development that has sent shockwaves through the cybersecurity community, researchers have identified a new attack vector targeting the Python Software Development Library (PyPI) supply chain. The latest exploit, dubbed "TeamPCP," has compromised a legitimate software package, Telnyx, and replaced it with malicious releases containing multi-stage infostealers and persistence mechanisms.

    The incident, which was first reported by Ox Security, a cybersecurity firm that specializes in identifying and mitigating vulnerabilities in the PyPI supply chain, highlights the ongoing threats posed by sophisticated cyber attackers who are continually seeking new ways to compromise software packages and inject malware into unsuspecting users' systems.

    According to researchers, TeamPCP appears to be a group of skilled cybercriminals who have been linked to previous incidents involving compromised PyPI packages. The attackers, who are believed to be based in Eastern Europe or Russia, used a combination of social engineering tactics and exploits to gain access to the Telnyx package repository on PyPI.

    Once inside the repository, the attackers replaced the current package versions with malicious releases that contained a multi-stage infostealer and persistence mechanisms. The infostealer, which is designed to steal sensitive information from infected systems, was found to be similar in design to the malware used in previous attacks linked to TeamPCP.

    The Telnyx package poisoning incident highlights the ongoing risks posed by compromised software packages on PyPI. With over 34,000 downloads per week, the Telnyx package is one of the most popular and widely-used packages on PyPI. The fact that a legitimate software package was compromised in this way underscores the need for greater vigilance and monitoring within the PyPI community.

    In response to the incident, Telnyx issued a statement confirming that it had found and resolved the issue, while noting that none of its infrastructure or services were affected. However, the company warned users who installed the affected package versions (4.87.1 or 4.87.2) to treat their systems as compromised and to rotate any exposed credentials.

    The Telnyx incident is just the latest in a series of high-profile attacks on PyPI packages that have been linked to TeamPCP. The group, which has been responsible for several previous incidents involving compromised software packages, appears to be increasingly sophisticated in its tactics.

    In addition to the Telnyx package poisoning incident, researchers have also identified another potential threat vector linked to TeamPCP. According to reports, a suspect believed to be behind RedLine operations was extradited to the US last week on charges of conspiracy to commit access device fraud and other related offenses.

    The RedLine operation is believed to have involved registering virtual private servers and domains to host malicious infrastructure, as well as creating repositories used to distribute malware. The group's alleged leader, Hambardzum Minasyan, faces up to 30 years in prison if convicted on all charges.

    While the Telnyx incident highlights the ongoing risks posed by compromised software packages on PyPI, it also underscores the need for greater collaboration and coordination within the cybersecurity community. By working together, researchers and developers can identify and mitigate vulnerabilities more quickly, reducing the risk of attacks like the one described above.

    In conclusion, the recent Telnyx package poisoning incident highlights the ongoing threats posed by sophisticated cyber attackers who are continually seeking new ways to compromise software packages and inject malware into unsuspecting users' systems. As researchers continue to monitor the PyPI supply chain for potential vulnerabilities, it is essential that developers and users remain vigilant and take steps to protect themselves against these types of attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Telnyx-Package-Poisoning-A-New-Twist-on-PyPI-Supply-Chain-Compromise-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2026/03/30/telnyx_pypi_supply_chain_attack_litellm/

  • https://www.securityweek.com/telnyx-targeted-in-growing-teampcp-supply-chain-attack/

  • https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm


  • Published: Mon Mar 30 13:00:44 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us