Skip to content
Dev.to

PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation

Executive Summary The PyPI repository has once again fallen victim to a sophisticated supply chain attack, this time targeting the telnyx package in versions 4.87.1 and 4.87.2 . The culprit, TeamPCP , reused the same RSA key and tpcp.tar.gz exfiltration header as in their previous litellm compromise, demonstrating a pattern of persistence and technical sophistication. The malicious code, injected into telnyx/\_client.py , activates on import telnyx , requiring no user interaction —a silent but d
Read original on dev.to
0
0

2 comments

techfan421h ago

This is a really insightful piece. The data backs up what I've been seeing in the industry.

devops_sam45m ago

Agreed. Would love to see a follow-up with more recent numbers.

curious_reader2h ago

I'm not sure the conclusion holds for smaller teams. Would be interesting to see this broken down by company size.

Related

Liked this? Start your own feed.

Your own feed is waiting.
0
0