Originally reported by Hackread
TL;DR
TeamPCP compromised two versions of Telnyx's Python SDK on PyPI, embedding credential-stealing malware disguised as ringtone files. Developers who installed versions 4.87.1 or 4.87.2 may have had their cloud and cryptocurrency credentials compromised.
Active supply chain attack targeting Python developers through compromised SDK versions on PyPI, designed to steal cloud and cryptocurrency credentials from production environments.
Threat actor TeamPCP executed a supply chain attack against users of the Telnyx Python SDK by uploading malicious versions to the Python Package Index (PyPI). According to Telnyx's urgent security alert, the compromised versions 4.87.1 and 4.87.2 contained credential-stealing malware designed to harvest cloud and cryptocurrency credentials from developer environments.
The malicious SDK versions employed a deceptive technique, embedding the credential theft functionality within what appeared to be legitimate ringtone files. This approach likely helped the malicious code evade initial detection while maintaining the SDK's expected functionality to avoid suspicion from developers during testing.
The targeting of both cloud credentials and cryptocurrency wallets suggests TeamPCP sought to maximize the potential value of compromised developer workstations, which often contain elevated access tokens and personal crypto assets.
Developers who installed the compromised SDK versions between their upload and Telnyx's alert face potential exposure of:
The attack demonstrates the continuing vulnerability of open-source package ecosystems to typosquatting and legitimate package compromise, where a single malicious upload can reach thousands of downstream users.
Developers should immediately:
Organizations should establish processes for rapid response to supply chain compromise notifications and consider implementing software bill of materials (SBOM) tracking for third-party dependencies.
Originally reported by Hackread