Telnyx SDK Hacked: 790K Downloads Affected

This title was summarized by AI from the post below.

⚠️ Another major supply chain attack: this time targeting telnyx, a Python SDK for carrier grade communications with 790K monthly downloads. ⚠️ Chainguard Libraries customers are not impacted. 📦 Affected versions on PyPI: 4.87.1, 4.87.2 ✅ Last clean version: 4.87.0 (published March 26) The next attack from TeamPCP, the bad actors behind Trivy, Checkmarx, LiteLLM and Canisterworm) is both sophisticated and unsettling: * Malicious code executes immediately on import telnyx, before your app even runs * Payloads are hidden inside a fake audio file (hangup.wav) downloaded from a C2 server * On Windows: persistence via startup folder * On Linux/macOS: credential harvesting (similar to Trivy & LiteLLM attacks) Open source’s interconnectedness is both its greatest strength and flaw. When attackers steal CI/CD credentials, they can publish malicious packages directly to public registries that, in turn, harvest more credentials. Those credentials are then used for the next attack. As a response to this continuing wave of TeamPCP attacks, we are making our Trivy image free for 12 months and Chainguard Libraries and Actions free for three months (see comments for sign-up details). More about this attack on the blog: https://lnkd.in/g4uwuwqD

  • No alternative text description for this image
Jason Covey

Chainguard3K followers

4d

It’s starting to get hard to keep track of all these compromises

Cole O'Shaughnessy

Chainguard3K followers

4d

Seems it's gonna be quite the weekend

See more comments

To view or add a comment, sign in

Explore content categories