⚠️ Another major supply chain attack: this time targeting telnyx, a Python SDK for carrier grade communications with 790K monthly downloads. ⚠️ Chainguard Libraries customers are not impacted. 📦 Affected versions on PyPI: 4.87.1, 4.87.2 ✅ Last clean version: 4.87.0 (published March 26) The next attack from TeamPCP, the bad actors behind Trivy, Checkmarx, LiteLLM and Canisterworm) is both sophisticated and unsettling: * Malicious code executes immediately on import telnyx, before your app even runs * Payloads are hidden inside a fake audio file (hangup.wav) downloaded from a C2 server * On Windows: persistence via startup folder * On Linux/macOS: credential harvesting (similar to Trivy & LiteLLM attacks) Open source’s interconnectedness is both its greatest strength and flaw. When attackers steal CI/CD credentials, they can publish malicious packages directly to public registries that, in turn, harvest more credentials. Those credentials are then used for the next attack. As a response to this continuing wave of TeamPCP attacks, we are making our Trivy image free for 12 months and Chainguard Libraries and Actions free for three months (see comments for sign-up details). More about this attack on the blog: https://lnkd.in/g4uwuwqD
Seems it's gonna be quite the weekend
Chainguard•3K followers
4dIt’s starting to get hard to keep track of all these compromises