Overview

TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python Package Index (PyPI) repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file.

Organisations Involved

The following organisations are mentioned in relation to this incident: Backdoored Telnyx, Hides Stealer, Pushes Malicious Telnyx Versions, Python Package Index.

Multi-Source Coverage

This event has been reported across multiple outlets:


Sources: bleepingcomputer, thehackernews. Aggregated by Cybernews Agency pipeline.