TeamPCP, the threat actor behind the earlier LiteLLM supply chain compromise, published two malicious versions of the Telnyx Python SDK (4.87.1 and 4.87.2) to PyPI on March 27, 2026. The attack introduces several evasion improvements: split-file code injection across _client.py, WAV-based steganography to deliver
Sort: