TeamPCP Backdoors Telnyx PyPI Package Days After LiteLLM Breach

A threat actor known as TeamPCP compromised the Python Package Index (PyPI) “telnyx” SDK less than three days after a previous compromised package incident, publishing versions 4.87.1 and 4.87.2 with malicious backdoors that weren’t in the official repository. The first attempt failed due to a typo, but the fixed release executed payloads that drop persistent malware on Windows or a credential stealer on Linux/macOS. The malware harvests SSH keys, cloud tokens, config files, Kubernetes tokens, and more, exfiltrating it to a command‑and‑control server. Analysis shows reuse of the same cryptographic key and techniques from the earlier LiteLLM compromise, suggesting a linked campaign that targets software supply chain trust in widely used open source packages and can lead to full environment compromise unless credentials are rotated and systems checked.

https://www.endorlabs.com/learn/teampcp-strikes-again-telnyx-compromised-three-days-after-litellm

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities