TeamPCP has made the telnyx Python package less secure by releasing two bad versions of it This article explores teampcp telnyx python. . The malware is made to work on Windows, Linux, and macOS.
It is recommended that users immediately go back to version 4.87.0. A few days later, the threat actor sent out trojanized versions of the popular litellm Python package to steal cloud credentials, CI/CD secrets, and keys to a domain it controls. No one knows how TeamPCP got the package's PYPI_TOKEN, but it's likely that it was through a previous credential harvesting operation. The PyPI project is in quarantine right now.
Instead of directly publishing malicious typosquats to open-source package repositories, the threat actor has always infected legitimate, trusted packages with large user bases to spread malware to downstream users.
The deal is part of a larger, ongoing campaign by TeamPCP that affects many ecosystems. The threat actor said they were working with other cybercriminal groups, such as LAPSUS$ and a new ransomware group called Vect, to carry out extortion and ransomware attacks. This shows that ransomware groups are now using supply chain attacks on open source infrastructure as a way to get into other systems for follow-up attacks.
Snyk said, "This shines a light on anything in CI/CD environments that isn't locked down." He said, "When attackers are going after the tools themselves, anything running in the pipeline has to be seen as a possible entry point."
The attack is aimed at tools that have high-level access to automated pipelines, such as a container scanner (Trivy), an infrastructure scanning tool (KICS), and an AI model routing library (litellm). A group of hackers called Team PCP did the attack.











