As of March 30, 2026, threat actor TeamPCP has evolved its supply chain tactics by compromising the Telnyx Python SDK. This campaign marks a significant technical shift from their previous LiteLLM attack, introducing WAV-based steganography and Windows-specific persistence. Organizations using Telnyx versions 4.87.1 or 4.87.2 should consider their systems fully compromised and downgrade to version 4.87.0 immediately.
The attack significantly improves stealth compared to prior campaigns:
A major innovation in this campaign is the use of audio steganography:
This approach eliminates malicious code from the package itself, shifting it to runtime delivery and evading code scanning tools.
Unlike the earlier Linux-only LiteLLM attack, this variant targets Linux, macOS, and Windows:
Windows Path (Persistence Focus)
Linux/macOS Path
Attribution is confirmed through identical tooling reuse, including:
This indicates a consistent and evolving threat actor toolkit rather than a copycat campaign.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy