PULSE NAME
Telnyx PyPI Supply-Chain Campaign Targets Developers with WAV-Based Malware
WHITE cryptocti 2026-03-28 Modified: 2026-03-28
6
IOCs
LOW VOLUME
A malicious Python package hosted on PyPI was discovered to contain a hidden backdoor that delivers malware concealed within WAV audio files.
Indicators of Compromise (6)
All FileHash-SHA256 IPv4 URL
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9 2026-03-28
FileHash-SHA256 cd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3 2026-03-28
IPv4 83.142.209.203 CC=UA ASN=ASNone 2026-03-28
URL http://83.142.209.203:8080/ 2026-03-28
URL http://83.142.209.203:8080/hangup.wav 2026-03-28
URL http://83.142.209.203:8080/ringtone.wa 2026-03-28