PULSE NAME
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
WHITE TeamPCP AlienVault 2026-03-30 Modified: 2026-03-30
7
IOCs
LOW VOLUME
TeamPCP launched a sophisticated attack on the Telnyx Python SDK, publishing malicious versions 4.87.1 and 4.87.2 to PyPI. The attack represents an evolution from their previous LiteLLM campaign, incorporating WAV-based steganography, split-file code injection, and expanded platform support. The payload, activated on import, uses stealthy techniques to download and execute credential-stealing malware across Linux, macOS, and Windows systems. Key changes include the use of audio steganography to hide malicious code, improved evasion through split-file injection, and the addition of Windows support with Startup folder persistence. The attackers shifted from HTTPS to plaintext HTTP infrastructure, potentially exposing their activities to network monitoring. Organizations are advised to downgrade to the last clean version and treat affected systems as compromised.
Indicators of Compromise (7)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 5870a0bf82bbdf2687d8dce89dfa668f 2026-03-30
FileHash-SHA1 4ce6ad55d8912aacc4ae4c572237131d0b7ba4b5 2026-03-30
FileHash-SHA256 23b1ec58649170650110ecad96e5a9490d98146e105226a16d898fbe108139e5 2026-03-30
FileHash-SHA256 7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9 2026-03-30
FileHash-SHA256 ab4c4aebb52027bf3d2f6b2dcef593a1a2cff415774ea4711f7d6e0aa1451d4e 2026-03-30
FileHash-SHA256 cd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3 2026-03-30
IPv4 83.142.209.203 2026-03-30