Cybersecurity Alert: TeamPCP Expands Malicious Campaign Targeting Telnyx
In a deeply concerning development for the cybersecurity landscape, TeamPCP, a notorious cyber threat group, has escalated its supply chain attack operations by targeting the Telnyx cloud communications platform. Security researchers have flagged this recent activity, highlighting the focus of TeamPCP on open-source repositories, notably the Python Package Index (PyPI), which serves as the primary platform for developers to share and download Python software packages.
Recent Trends in TeamPCP’s Activities
TeamPCP first garnered attention by employing a strategy known as typosquatting. Through this method, the group successfully misled developers into downloading malicious packages disguised as legitimate software. In a notable instance, they compromised Trivy, an extensively used open-source vulnerability scanner created by Aqua Security, by embedding credential-stealing malware within official releases and GitHub Actions. Following this attack, researchers discovered that TeamPCP had targeted LiteLLM, an AI Gateway Python library, furthering concerns about their growing capabilities.
The most recent attack by TeamPCP against Telnyx, a service that provides application programming interfaces (APIs) for various telecommunications activities including SMS and MMS, follows a concerning pattern of escalating attacks. On March 27, researchers from both Socket and Endor Labs publicized their findings indicating that the official Telnyx Python Software Development Kit (SDK) had succumbed to a software supply chain attack.
Compromise of the Telnyx SDK
According to Socket’s analysis, the telnyx package, a legitimate and widely utilized SDK, was found to have been manipulated. The researchers identified that specific versions—namely 4.87.1 and 4.87.2—of the package had been corrupted with code engineered to extract sensitive data from unwitting victim environments. The Socket Research Team issued a stern warning against the use of these compromised versions, emphasizing that researchers from Aikido Security and Wiz, now a part of Google Cloud, had independently corroborated their findings.
The focus of the attack was particularly alarming: the functionality injected into the package aimed to capture SSH private keys and shell history files from affected systems, transmitting this sensitive information to a server controlled by the attackers. This compromise executed at install time, allowing it to activate as soon as a developer or an automated process installed or updated the package—effectively bypassing the need to interact with any malicious code directly.
The Mechanics of the Attack
Endor Labs researchers corroborated Socket’s findings and detailed how the threat actor secured the ability to publish malicious versions of the telnyx package by breaching the credentials of a maintainer’s account. This strategy is recognized as especially perilous, as it does not exploit inherent vulnerabilities within PyPI’s infrastructure. Instead, it capitalizes on legitimate publishing privileges to disseminate trojanized versions that appear authentic to both manual and automated dependency resolution processes.
The risks associated with this type of attack are significant. Given that the compromised package retains its legitimate name and functions as expected, detecting the attack becomes exceedingly difficult through casual inspection or routine functional testing. Notably, the injected payload specifically targeted high-value files crucial for lateral movement and credential harvesting. By stealing SSH private keys, the attacker could infiltrate other systems the victim had access to, while extracting shell history could reveal sensitive operational details such as commands containing credentials or internal tools.
Implications of TeamPCP’s Evolving Tactics
The quick succession of attacks—just three days apart—between LiteLLM and Telnyx suggests a calculated approach from TeamPCP, with the group actively iterating their attacks across various targets instead of executing isolated opportunistic operations. Researchers at Endor Labs highlighted that this pattern marks a significant evolution in the group’s methodology, moving beyond the reliance on typosquatting to directly compromise well-regarded, trusted packages.
Additionally, recent intelligence indicates that TeamPCP has started collaborating with the Vect ransomware group, leading to larger-scale ransomware operations that could amplify the threat posed by their supply chain compromises.
Recommendations and Next Steps
In light of these developments, cybersecurity experts advise that organizations conduct thorough audits of their environments to identify any instances of the malicious versions of the Telnyx package. Furthermore, it is crucial for organizations to rotate any compromised credentials or keys, especially in systems where the tainted package may have been installed.
As the cyber threat landscape continues to evolve, proactive measures and heightened vigilance will be essential to counteracting the sophisticated tactics employed by groups like TeamPCP. The need for robust security protocols in the open-source community is more imperative than ever to protect developers and their projects from falling victim to these malicious campaigns.

