Wiz Agents & Workflows are here
Vulnerability DatabaseGHSA-955r-262c-33jc

GHSA-955r-262c-33jc
Python vulnerability analysis and mitigation

Summary

On March 27, 2026, a threat actor used compromised PyPI credentials to publish malicious versions 4.87.1 and 4.87.2 of the telnyx Python package directly to PyPI. These versions contain credential-stealing malware and were not published through the legitimate GitHub release pipeline.

Exposure Window

VersionPublished (UTC)Quarantined (UTC)Exposure
4.87.1 (broken)2026-03-27 03:512026-03-27 10:136h 22m
4.87.2 (functional)2026-03-27 04:072026-03-27 10:136h 6m

Both versions were quarantined by PyPI at 2026-03-27 10:13 UTC. Note: Version 4.87.1 contained a typo that prevented the malware from executing. Only 4.87.2 was fully functional.

Who Is Affected

You may be affected if:

  • You installed or upgraded the telnyx Python package between 03:51 UTC and 10:13 UTC on March 27, 2026
  • You ran pip install telnyx without pinning a version and received 4.87.1 or 4.87.2
  • A dependency in your project pulled in telnyx as a transitive, unpinned dependencyYou are NOT affected if:
  • You pinned to version 4.87.0 or earlier
  • You installed before March 27, 2026 and did not upgrade
  • You built from GitHub source (malicious code was never committed to the repository)

Attack Details

Root Cause

The attacker obtained the PyPI API token and uploaded malicious packages directly to PyPI, bypassing the GitHub release pipeline entirely. No malicious commits exist in the GitHub repository.

Malicious Behavior

The malware is injected into telnyx/_client.py (74 additional lines) and executes on import telnyx: Linux/macOS:

  1. Spawns detached subprocess to survive parent exit
  2. Downloads payload hidden inside WAV audio file (steganography) from C2
  3. Harvests credentials: SSH keys, AWS/GCP/Azure creds, Kubernetes tokens, Docker configs, .env files, database credentials, crypto wallets
  4. If Kubernetes access found, deploys privileged pods to all nodes for lateral movement
  5. Encrypts with AES-256-CBC + RSA-4096, exfiltrates to C2

Windows:

  1. Downloads binary hidden inside WAV file from C2
  2. Drops as msbuild.exe in Startup folder for persistence
  3. Executes with hidden window

Version Differences

VersionStatusNotes
4.87.1BrokenTypo: Setup() instead of setup() caused NameError
4.87.2FunctionalAttacker uploaded 16 minutes later to fix their own casing error; full attack chain operational

Verified Safe Version

VersionFileSHA-256
4.87.0telnyx-4.87.0-py3-none-any.whl5aeb8172c29ade224e6c2d166713f304596aa21e3dbfa5b6b2b028e6997f6bd2
4.87.0telnyx-4.87.0.tar.gz3f093a85c313c2b779594f99fc07f453f1a7fd8785878d963688c531ff94d03a

1. Check If You Are Affected


# Check installed version
pip show telnyx | grep Version

# Check pip cache for telnyx versions
pip cache list telnyx 2>/dev/null

# Check when telnyx was installed (modification time)
ls -la $(python -c "import site; print(site.getsitepackages()[0])")/telnyx* 2>/dev/null

2. Remove Compromised Versions

pip uninstall telnyx

3. Rotate All Potentially Exposed Secrets

If there is any possibility that version 4.87.1 or 4.87.2 was installed in your environment, treat all accessible secrets as compromised:

  • SSH keys
  • AWS/GCP/Azure credentials
  • Kubernetes tokens and service accounts
  • Docker registry credentials
  • Database passwords
  • API keys in .env files
  • Telnyx API keys

4. Check for Persistence (Linux/macOS)


# Check for malicious systemd service
systemctl --user status audiomon 2>/dev/null
ls -la ~/.config/audiomon/ 2>/dev/null

# Check state file
ls -la /tmp/.initd_state 2>/dev/null

5. Check for Persistence (Windows)


# Check Startup folder
Get-ChildItem "$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\msbuild.exe"

6. Pin to Safe Version

pip install telnyx==4.87.0

Or in requirements.txt:

telnyx==4.87.0

Indicators of Compromise

Malicious Package Hashes

FileSHA-256
telnyx-4.87.1-py3-none-any.whl7321caa303fe96ded0492c747d2f353c4f7d17185656fe292ab0a59e2bd0b8d9
telnyx-4.87.2-py3-none-any.whlcd08115806662469bbedec4b03f8427b97c8a4b3bc1442dc18b72b4e19395fe3

Network

IoCType
83.142.209.203C2 IP address
http://83.142.209.203:8080/ringtone.wavPayload endpoint (Linux/macOS)
http://83.142.209.203:8080/hangup.wavPayload endpoint (Windows)
http://83.142.209.203:8080/rawPersistence polling endpoint

Filesystem

PathPlatformPurpose
~/.config/audiomon/audiomon.pyLinux/macOSPersistence implant
~/.config/systemd/user/audiomon.serviceLinuxPersistence service
/tmp/.initd_stateLinux/macOSState tracking
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\msbuild.exeWindowsPersistence binary
msbuild.exe.lockWindows12-hour cooldown lock

Exfiltration

  • Archive name: tpcp.tar.gz
  • HTTP header: X-Filename: tpcp.tar.gz
  • Encryption: AES-256-CBC + RSA-4096 OAEP

Attribution

This attack is attributed to TeamPCP with high confidence based on:

  • Identical RSA-4096 public key as the LiteLLM compromise (March 24, 2026)
  • tpcp.tar.gz archive naming convention (TeamPCP signature)
  • Identical AES-256-CBC + RSA OAEP encryption scheme
  • Same credential harvesting targets and techniquesRSA Key Hash:
  • PEM SHA-256: 4eceb569b4330565b93058465beab0e6d5ea09cfba8e7f29d7be1b5a2abd958a

Resources


SourceNVD

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33641HIGH7.8
  • PythonPython
  • glances
NoNoMar 30, 2026
CVE-2026-34070HIGH7.5
  • PythonPython
  • langchain-core
NoYesMar 31, 2026
CVE-2026-34231MEDIUM6.1
  • PythonPython
  • slippers
NoYesMar 30, 2026
CVE-2026-34073LOW1.7
  • PythonPython
  • apache-beam-python-3.13-sdk
NoYesMar 31, 2026
GHSA-955r-262c-33jcCRITICALN/A
  • PythonPython
  • telnyx
NoNoMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management