Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The WAV of Malware: Telnyx PyPI Package Compromised by TeamPCP




A malicious Telnyx package has been compromised by TeamPCP, leaving thousands of developers vulnerable to malware infections. The attack highlights the ongoing struggle between cybersecurity professionals and threat actors, as well as the importance of vigilance and proactive measures to prevent such attacks.


  • A malicious version of the Telnyx package was compromised and released on PyPI, allowing hackers to steal sensitive information from infected hosts.
  • The attack involved using stolen credentials for the publishing account on PyPI registry to breach the project and upload malicious packages.
  • The compromised packages contained malware that stole sensitive information, including SSH keys, credentials, cloud tokens, and cryptocurrency wallets.
  • The malware used sophisticated steganographic capabilities to embed malicious code within audio files without altering their original content.
  • On Linux and macOS systems, the payload spawned a detached process that downloaded a second-stage disguised as an audio file from a remote command-and-control server.
  • On Windows systems, the malware downloaded a different audio file and extracted an executable named msbuild.exe, which was placed in the Startup folder for persistence.
  • Developers are advised to roll back to Telnyx version 4.87.0, which is the clean variant with no alterations, and take immediate action to protect themselves and their users from potential harm.
  • The attack highlights the importance of vigilance, proactive measures, regular updates, and robust security measures to prevent such attacks in the future.



  • A recent attack on the Python Package Index (PyPI) has left developers reeling, as a malicious version of the popular Telnyx package was compromised and released to the public. The Telnyx package, which allows users to integrate various communication services such as VoIP, messaging, and IoT connectivity into their applications, had been backdoored by the notorious hacking group TeamPCP.

    According to security researchers, the attack involved the use of stolen credentials for the publishing account on PyPI registry, allowing TeamPCP to breach the project and upload malicious versions of the Telnyx package. The compromised packages were released in versions 4.87.1 and 4.87.2, which are widely used by developers worldwide.

    Upon further investigation, it was discovered that the malicious code contained within the packages was designed to steal sensitive information from infected hosts, including SSH keys, credentials, cloud tokens, cryptocurrency wallets, environment variables, and other types of secrets. The malware also exhibited sophisticated steganographic capabilities, allowing it to embed malicious code within audio files without altering their original content.

    In the case of Linux and macOS systems, the payload spawned a detached process that downloaded a second-stage disguised as a WAV audio file (ringtone.wav) from a remote command-and-control server. The malware was extracted using an XOR-based decryption routine and executed in memory to harvest sensitive data from the infected host. If Kubernetes was running on the machine, the malware enumerated cluster secrets and deployed privileged pods across nodes, attempting to access the underlying host systems.

    On Windows systems, the malware downloaded a different WAV file (hangup.wav) that extracted an executable named msbuild.exe. The executable was placed in the Startup folder for persistence across system reboots, while a lock file limited repeated execution within 12-hour windows. Security researchers warned that any system that imported the malicious package versions should be treated as fully compromised, as the payload executed at runtime and may have already exfiltrated sensitive data.

    In response to this critical vulnerability, security experts are urging developers to roll back to Telnyx version 4.87.0, which is the clean variant with no alterations. Developers who find malicious versions of the package in their environments are advised to take immediate action to protect themselves and their users from potential harm.

    The attack highlights the ongoing struggle between cybersecurity professionals and threat actors, as well as the importance of vigilance and proactive measures to prevent such attacks. It also underscores the need for greater awareness and education among developers regarding the risks associated with compromised open-source packages and the importance of regularly updating dependencies to ensure the security of their applications.

    Furthermore, this incident serves as a stark reminder of the dangers of supply chain attacks and the importance of monitoring and testing software updates thoroughly before deploying them in production environments. As the threat landscape continues to evolve, it is crucial for developers and organizations to remain vigilant and proactive in addressing potential vulnerabilities before they can be exploited by malicious actors.

    In light of this critical vulnerability, security experts are now calling on PyPI administrators and developers to take immediate action to protect themselves from similar attacks in the future. This includes regular monitoring of package updates, rigorous testing of dependencies, and implementing robust security measures to prevent exploitation of vulnerabilities like the one discovered in the compromised Telnyx package.

    As the cybersecurity community continues to grapple with the complexities of modern threat actors and their tactics, it is essential that developers, organizations, and policymakers collaborate to create a more secure software development ecosystem. By working together, we can mitigate the risk of similar attacks and ensure that critical infrastructure remains resilient against emerging threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-WAV-of-Malware-Telnyx-PyPI-Package-Compromised-by-TeamPCP-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/backdoored-telnyx-pypi-package-pushes-malware-hidden-in-wav-audio/

  • https://www.moxfive.com/resources/moxfive-threat-actor-alert-teampcp

  • https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html

  • https://thecybersecguru.com/news/teampcp-supply-chain-attack/

  • https://codekeeper.co/ticker/teampcp-hacks-major-open-source-platforms


  • Published: Fri Mar 27 17:33:21 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us