Monday 30 March 2026Afternoon Edition

ZOTPAPER

News without the noise


Cybersecurity

Telnyx Python SDK Compromised on PyPI With Malware Hidden in WAV Audio Files

Sophisticated supply chain attack used steganography to embed payloads in audio file metadata and evade detection

Zotpaper2 min read
The Telnyx Python SDK on PyPI was compromised in a sophisticated supply chain attack that used WAV audio steganography to deliver malware. Malicious versions 4.87.1 and 4.87.2, uploaded by threat actor TeamPCP, executed arbitrary code on import and hid their payloads within the frame metadata of audio files.

The attack's technical sophistication stands out even among recent supply chain compromises. Upon import, the compromised package fetches a WAV file from a command-and-control server at 83.142.209.203:8080. The audio file maintains structural validity while concealing malicious data in its frame metadata.

The malware extracts hidden data, applies base64 decoding, and performs an XOR operation using initial bytes as the encryption key to reconstruct executable code. On Windows, the payload deploys msbuild.exe into the Startup folder for persistence. On Linux and macOS, a staged Python loader fetches additional payloads and AES-encrypts sensitive data before exfiltrating it.

The attack demonstrates an escalation in the creativity of supply chain compromises, moving beyond simple typosquatting to hijacking legitimate, trusted packages with novel evasion techniques.

Analysis

Why This Matters

Supply chain attacks on package registries continue to grow more sophisticated. Using steganography in audio files represents a new evasion technique that could bypass many existing security scanners focused on detecting malicious code in package files directly.

Background

PyPI supply chain attacks have increased dramatically over the past two years. Previous notable incidents include the compromise of the ua-parser-js npm package and various Python typosquatting campaigns. This attack targets an established, legitimate package rather than creating a lookalike.

Key Perspectives

Security researchers note the attack's multi-stage design and cross-platform capability suggest a well-resourced threat actor. The use of steganography adds a layer of obfuscation that most automated security tools are not equipped to detect.

What to Watch

Whether PyPI implements additional verification requirements for package maintainers, and whether similar steganography-based delivery mechanisms appear in other package ecosystems.

Sources