TeamPCP, the threat actor behind the earlier LiteLLM supply chain compromise, published two malicious versions of the Telnyx Python SDK (4.87.1 and 4.87.2) to PyPI on March 27, 2026. The attack introduces several evasion improvements: split-file code injection across _client.py, WAV-based steganography to deliver

7m read timeFrom trendmicro.com
Post cover image
Table of contents
Key takeawaysOverviewSplit-file injection: Increased evasion

Sort: