
Hackers Backdoor Telnyx Python SDK on PyPI to Steal Credentials Across Windows, macOS, and Linux
The Python Package Index (PyPI) is a cornerstone for developers, offering a vast array of open-source libraries that power applications across every sector. When this critical ecosystem is compromised, the implications can be far-reaching, affecting development workflows and endangering sensitive data. Recently, a nefarious campaign by the threat actor group TeamPCP brought this stark reality into focus, targeting the widely used Telnyx Python SDK.
The Telnyx Python SDK Backdoor: A Deep Dive
On March 27, 2026, the cybersecurity landscape witnessed a concerning incident: two malicious versions, 4.87.1 and 4.87.2, of the Telnyx Python SDK were reportedly uploaded to PyPI without corresponding official commits. This stealthy maneuver, identified by cybersecurity researchers and reported by sources like Cyber Security News, allowed attackers to backdoor a popular cloud communications library boasting over 700,000 downloads in February alone.
The core objective of this sophisticated supply chain attack was unambiguous: credential theft. By injecting malicious code into what appeared to be legitimate updates, TeamPCP aimed to gain unauthorized access to credentials from developers and systems utilizing the compromised SDK across a diverse range of operating systems, including Windows, macOS, and Linux.
Understanding the Threat: Supply Chain Attacks on PyPI
This incident underscores the growing threat of supply chain attacks within open-source ecosystems. Attackers are increasingly shifting their focus from direct system breaches to compromising foundational components like software development kits (SDKs) and libraries. When an essential package on a platform like PyPI is tampered with, every project that depends on it becomes a potential victim, creating a ripple effect of vulnerability.
The lack of corresponding commits for the malicious versions 4.87.1 and 4.87.2 is a critical indicator of compromise. Legitimate updates usually involve a transparent process of code changes, testing, and version control. The absence of these standard procedures should immediately raise red flags for anyone monitoring package integrity.
Targeted Systems and Impact
The Telnyx Python SDK is designed for seamless integration with Telnyx’s cloud communication services, enabling developers to build features like voice, messaging, and video into their applications. Its broad adoption means that a successful backdoor could expose a vast array of systems. The malicious payload was engineered to operate across different operating systems: Windows, macOS, and Linux. This cross-platform capability signifies a well-planned attack, indicating that TeamPCP sought to maximize their potential victim pool and credential harvesting opportunities.
The compromise could lead to:
- Unauthorized access to Telnyx API keys and other API credentials.
- Broader system access if developers reuse credentials or if the stolen credentials provide a foothold for further lateral movement.
- Data exfiltration of sensitive information processed by applications using the SDK.
Remediation Actions
Immediate and decisive action is crucial for any organization or developer using the Telnyx Python SDK. Given the confirmed compromise, a proactive stance is the only way to mitigate potential damage.
- Version Audit: Immediately check all development and production environments for installations of Telnyx Python SDK versions 4.87.1 and 4.87.2. Any instance of these versions should be considered compromised.
- Downgrade or Update: If compromised versions are found, downgrade to a known good, stable version of the Telnyx Python SDK (e.g., 4.87.0 or earlier, or update to officially sanctioned, thoroughly vetted future releases) as advised by Telnyx. Do not simply remove and reinstall the same potentially compromised version.
- Credential Rotation: Assume all credentials associated with applications using the Telnyx Python SDK in the affected timeframe (especially those used with compromised versions) have been compromised. Immediately rotate Telnyx API keys, and any other API keys or sensitive credentials that might have been present in the environment where the compromised SDK was used.
- System Scan: Conduct comprehensive security scans of all affected development machines, build servers, and production environments for any signs of lingering compromise or secondary infections.
- Dependency Monitoring: Implement or strengthen dependency monitoring tools that can alert to changes in third-party packages, especially those without corresponding source code updates.
- Supply Chain Security Best Practices: Review and enhance supply chain security protocols, including verifying package integrity (e.g., through cryptographic hashes) before deployment and using private package indexes where possible for critical dependencies.
Detection Tools and Strategies
Identifying compromised packages and potential breaches requires a combination of automated tools and diligent monitoring.
| Tool Name | Purpose | Link |
|---|---|---|
| `pip check` & `pip list` | Basic local package integrity and listing | pip documentation |
| Dependency-Track | Software Bill of Materials (SBOM) and supply chain risk management | dependencytrack.org |
| Snyk Open Source | Vulnerability scanning for open-source dependencies | snyk.io |
| TruffleHog | Credential and sensitive data scanning in code | trufflesecurity.com |
| OSSEC / Wazuh | Host-based Intrusion Detection System (HIDS) for file integrity monitoring | ossec.net / wazuh.com |
Conclusion
The backdooring of the Telnyx Python SDK on PyPI by TeamPCP serves as a stark reminder of the persistent and evolving threats within software supply chains. Organizations and developers must prioritize robust security practices, including vigilant dependency management, regular security audits, and immediate response to disclosed vulnerabilities. Maintaining a posture of continuous vigilance is no longer optional; it is fundamental to protecting sensitive data and maintaining operational integrity in an interconnected world.


