TeamPCP Backdoors Telnyx PyPI Package Days After LiteLLM Breach
A threat actor known as TeamPCP compromised the Python Package Index (PyPI) “telnyx” SDK less than three days after a previous compromised package incident, publishing versions 4.87.1 and 4.87.2 with malicious backdoors that weren’t in the official repository. The first attempt failed due to a typo, but the fixed release executed payloads that drop persistent malware on Windows or a credential stealer on Linux/macOS. The malware harvests SSH keys, cloud tokens, config files, Kubernetes tokens, and more, exfiltrating it to a command‑and‑control server. Analysis shows reuse of the same cryptographic key and techniques from the earlier LiteLLM compromise, suggesting a linked campaign that targets software supply chain trust in widely used open source packages and can lead to full environment compromise unless credentials are rotated and systems checked.
https://www.endorlabs.com/learn/teampcp-strikes-again-telnyx-compromised-three-days-after-litellm
Comments
Post a Comment