Popular #LiteLLM #PyPI package #backdoored to steal #credentials , auth #tokens

The #TeamPCP #hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI & claiming to have stolen data from hundreds of thousands of devices during the attack.

LiteLLM is an open-source #Python library that serves as a gateway to multiple large language model ( #LLM ) providers via a single #API.
#privacy #security #supplychain

https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/

Popular LiteLLM PyPI package compromised in TeamPCP supply chain attack

The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack.

BleepingComputer

Telnyx PyPI Supply-Chain Campaign Targets Developers with WAV-Based Malware

A malicious Python package hosted on PyPI was discovered to contain a hidden backdoor that delivers malware concealed within WAV audio files.

Pulse ID: 69c7dc08eccb099120febe32
Pulse Link: https://otx.alienvault.com/pulse/69c7dc08eccb099120febe32
Pulse Author: cryptocti
Created: 2026-03-28 13:47:52

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #PyPI #Python #bot #developers #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

BEEP, BEEP - I am your friendly #Snakemake release announcement bot.

There is a new release of Snakemake. Its version now is 9.19.0!

Give us some time, and you will automatically find it on #Bioconda and #Pypi.

The maintainer is here on Mastodon -
@johanneskoester .

If you discover any issues, please report them on https://github.com/snakemake/snakemake/issues.

See https://github.com/snakemake/snakemake/releases/tag/v9.19.0 for details. Here is the header of the changelog:
𝑅𝑒𝑙𝑒𝑎𝑠𝑒 𝑁𝑜𝑡𝑒𝑠 (𝑝𝑜𝑠𝑠𝑖𝑏𝑙𝑦 𝑎𝑏𝑏𝑟𝑖𝑔𝑒𝑑):
𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐬

* clean up profile handling, switch to `profile.yaml` as default file name, allow specifying yaml file instead of dir: https://github.com/snakemake/snakemake/issues/4087

𝐁𝐮𝐠 𝐅𝐢𝐱𝐞𝐬

* avoid race conditions in wrapper/script/notebook retrieval; better error messages for missing wrappers; introduction of DAGProcessorBase for modularization of DAG processing code: https://github.com/snakemake/snakemake/issues/4133

𝐃𝐨𝐜𝐮𝐦𝐞𝐧𝐭𝐚𝐭𝐢𝐨𝐧

* update installation instuctions: https://github.com/snakemake/snakemake/issues/4025

Backdoored Telnyx PyPI package pushes malware hidden in WAV audio

TeamPCP hackers compromised the Telnyx package on the Python Package Index today, uploading malicious versions that deliver credential-stealing malware hidden inside a WAV file.

BleepingComputer

🐍 Popular telnyx package compromised on PyPI by TeamPCP

「 The injection is in telnyx/_client.py, which runs at import time. No install hook to disable, no postinstall to block. Just import telnyx and the malware runs. 」

https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm

#telnyx #supplychain #pypi #infosec

Popular telnyx package compromised on PyPI by TeamPCP

The popular telnyx packageon PyPI, used by big AI companies, has been compromised by TeamPCP

🚨 BREAKING: Software supply chain is still a house of cards! 🚀 #PyPI strikes again with a malicious package drama, because who needs security when you can have excitement? 🙌 Just another day in the life of developers—downloading surprises since forever! 🎉
https://lwn.net/Articles/1065059/ #SoftwareSupplyChain #MaliciousPackage #SecurityDrama #DeveloperLife #DownloadSurprises #HackerNews #ngated
The telnyx packages on PyPI have been compromised

The SafeDep blog reports that compromised versions of the telnyx package have been found in the [...]

LWN.net
The telnyx packages on PyPI have been compromised

The SafeDep blog reports that compromised versions of the telnyx package have been found in the [...]

LWN.net

AI Infrastructure Supply Chain Poisoning Alert

A supply chain poisoning attack on LiteLLM, a popular AI model gateway, was detected by NSFOCUS Technology CERT. The TeamPCP group compromised the Trivy security scanning tool used in LiteLLM's release process, allowing them to publish malicious versions 1.82.7 and 1.82.8 on PyPI. These versions contained credential-stealing programs that collected sensitive data and, if a Kubernetes cluster was detected, deployed privileged Pods and implanted persistent backdoors. The attack impacted numerous dependent packages and potentially affected millions of users. The incident highlights the growing risks in AI infrastructure and the need for robust supply chain security measures.

Pulse ID: 69c6d3a930c99b3993018f22
Pulse Link: https://otx.alienvault.com/pulse/69c6d3a930c99b3993018f22
Pulse Author: AlienVault
Created: 2026-03-27 18:59:53

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #OTX #OpenThreatExchange #PyPI #SupplyChain #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
📢 Oh no, the Telnyx Python SDK has been breached! 😱 Apparently, someone thought it was a great idea to sneak malicious code into #PyPI. 🚨 This is what happens when your "supply chain security" is more like "supply chain Swiss cheese." 🧀🔒
https://telnyx.com/resources/telnyx-python-sdk-supply-chain-security-notice-march-2026 #TelnyxSDK #Breach #MaliciousCode #SupplyChainSecurity #Vulnerability #HackerNews #ngated
Telnyx Python SDK Security Notice: Malicious PyPI Versions Identified (March 2026)

Telnyx identified and removed malicious Python SDK versions (4.87.1 and 4.87.2) published to PyPI. The platform was not compromised. Learn who is affected and the steps to remediate securely.

🌗 熱門 Telnyx 套件遭 TeamPCP 駭客組織惡意篡改,透過 PyPI 散播病毒
➤ 透過 WAV 音訊隱藏惡意酬載:解析 TeamPCP 的新型供應鏈攻擊手法
https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm
駭客組織 TeamPCP 近期發動一系列針對軟體供應鏈的連續攻擊。他們利用先前從 Trivy 等安全工具中竊取的憑證,成功入侵並篡改了 PyPI 上的官方 Telnyx Python SDK。攻擊者將惡意代碼植入 `telnyx/_client.py`,並採用創新的「音訊隱寫術」(Steganography),將惡意酬載隱藏在偽裝成 .wav 音訊檔的數據幀中,藉此繞過一般的內容過濾檢測。此舉影響範圍廣泛,開發者若曾安裝相關版本,應立即採取清除行動並全面重置各項存取憑證。
+ 這手法太狡猾了!把惡意代碼藏在合法的音訊檔裡,傳統的安全防護根本看不出來,以後對第三方套件的依賴真的要更小心。
+ 這已經是
#供應鏈攻擊 #網路安全 #PyPI #惡意軟體 #TeamPCP
Popular telnyx package compromised on PyPI by TeamPCP

The popular telnyx packageon PyPI, used by big AI companies, has been compromised by TeamPCP