As of March 30, 2026, threat actor TeamPCP has evolved its supply chain tactics by compromising the Telnyx Python SDK. This campaign marks a significant technical shift from their previous LiteLLM attack, introducing WAV-based steganography and Windows-specific persistence. Organizations using Telnyx versions 4.87.1 or 4.87.2 should consider their systems fully compromised and downgrade to version 4.87.0 immediately.
Severity: High
Threat Details
1. Initial Compromise & Delivery
- On March 27, 2026, attackers published malicious versions (4.87.1 and 4.87.2) of the Telnyx SDK to PyPI without corresponding source control updates, indicating unauthorized package publishing.
- The malicious code was injected into telnyx/_client.py and executed automatically when the package was imported (import telnyx), requiring no user interaction.
- Impact scope: Any system installing these versions is considered fully compromised.
2. Advanced Evasion Techniques
The attack significantly improves stealth compared to prior campaigns:
- Split-file injection: Malicious code distributed across multiple sections of the file to avoid detection during casual inspection
- Runtime obfuscation: Strings decoded via Base64 wrapper (_d() function) instead of being stored in plaintext
- No static payload: Credential stealer not embedded directly in source code
3. WAV-Based Steganography Payload Delivery
A major innovation in this campaign is the use of audio steganography:
- Malware payload is hidden inside WAV audio files hosted on a C2 server
- Files appear legitimate and pass MIME-type validation
- Payload extraction process:
- Read WAV audio frames
- Base64 decode
- Split data into:
- First 8 bytes → XOR key
- Remaining bytes → encrypted payload
- XOR decryption reconstructs executable code
This approach eliminates malicious code from the package itself, shifting it to runtime delivery and evading code scanning tools.
4. Cross-Platform Execution & Persistence
Unlike the earlier Linux-only LiteLLM attack, this variant targets Linux, macOS, and Windows:
Windows Path (Persistence Focus)
- Downloads hangup.wav (http[:]//83[.]142.209.203:8080) to extract a PE executable.
- Installs as msbuild.exe in the Windows Startup folder.
- Uses an anti-replay lock file (msbuild.exe.lock) to prevent redundant execution if modified within 12 hours.
Linux/macOS Path
- Executes payload in background using subprocess.Popen
- Downloads ringtone.wav from same C2
- Extracts and runs credential harvester
- Exfiltrates data via encrypted archive (tpcp.tar.gz)
5. Attribution to TeamPCP
Attribution is confirmed through identical tooling reuse, including:
- RSA-4096 public key
- tpcp.tar.gz campaign identifier
- Custom exfiltration headers (X-Filename: tpcp.tar.gz)
- Encryption and execution patterns
This indicates a consistent and evolving threat actor toolkit rather than a copycat campaign.
Recommendations
- Immediately downgrade any installations of Telnyx versions 4.87.1 or 4.87.2 to the last known clean release, 4.87.0.
- Any system that imported the affected versions must be treated as fully compromised. Conduct a full forensic audit to check for credential theft and lateral movement.
- Since the primary goal of the payload is credential harvesting, rotate all API keys, SSH keys, and cloud service credentials (AWS/Azure/GCP) stored on or accessible from the affected machines.
- Scan for unexpected msbuild.exe binaries located in:
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup. - Look for the hidden anti-replay file msbuild.exe.lock. Attackers use attrib +h to hide this file from standard view.
- Configure NIDS or WAF to flag outbound HTTP requests containing the X‑Filename: tpcp.tar.gz header.
- Closely monitor CI/CD environments for unexpected network activity, particularly the downloading of external binary or audio payloads.
- Check if packages utilize PyPI “Trusted Publishers” (OIDC). In this case, the lack of OIDC configuration contributed to the credential-based compromise.
- Block the IOCs at their respective controls
https://www.virustotal.com/gui/collection/aa5c475fa5b7251247616a355c501b7745ea90061802b2d54d8938492b758e62/iocs
Source:
- https://www.trendmicro.com/en_us/research/26/c/teampcp-telnyx-attack-marks-a-shift-in-tactics.html
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.