Diamond Member ThaHaka 0 Posted March 27 Diamond Member Share Posted March 27 This is the hidden content, please Sign In or Sign Up TeamPCP, the threat actor behind the supply chain attack targeting Trivy, KICS, and litellm, has now compromised the telnyx Python package by pushing two malicious versions to steal sensitive data. The two versions, 4.87.1 and 4.87.2, published to the Python Package Index (PyPI) repository on March 27, 2026, concealed their credential harvesting capabilities within a .WAV file. Users are This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/306669-h4ckn3wsteampcp-pushes-malicious-telnyx-versions-to-pypi-hides-stealer-in-wav-files/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.