<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Teampcp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/teampcp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 30 Mar 2026 19:15:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/teampcp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Compromised Telnyx PyPI Package Distributes Credential-Stealing Malware</title><link>https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</link><pubDate>Mon, 30 Mar 2026 19:15:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-telnyx-pypi-compromise/</guid><description>A threat actor compromised the PyPI package `telnyx`, uploading malicious versions 4.87.1 and 4.87.2 containing credential-stealing malware that exfiltrates data to a C2 server.</description><content:encoded><![CDATA[<p>On March 27, 2026, the <code>telnyx</code> Python package on PyPI was compromised by TeamPCP, resulting in the distribution of malicious versions 4.87.1 and 4.87.2. The attacker, having gained unauthorized access to PyPI credentials, bypassed the legitimate GitHub release pipeline to upload these compromised packages directly. These versions contain malware designed to harvest sensitive credentials from infected systems and exfiltrate them to a command-and-control (C2) server. The malicious packages were available for approximately 6 hours before being quarantined by PyPI. Version 4.87.1 contained a typo preventing execution, making 4.87.2 the fully functional malicious version. This incident highlights the risk of supply chain attacks targeting open-source package repositories, potentially affecting any system that installed the <code>telnyx</code> package during the exposure window.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to PyPI credentials for the <code>telnyx</code> package.</li>
<li>The attacker uploads malicious versions 4.87.1 and 4.87.2 of the <code>telnyx</code> package to PyPI, bypassing the legitimate GitHub repository.</li>
<li>When a user installs or upgrades to the malicious <code>telnyx</code> package, the injected malware within <code>telnyx/_client.py</code> executes upon importing the library (<code>import telnyx</code>).</li>
<li>On Linux/macOS systems, the malware spawns a detached subprocess to ensure persistence and downloads a payload hidden inside a WAV audio file (<code>ringtone.wav</code>) from the C2 server at <code>http://83.142.209.203:8080/</code>.</li>
<li>The downloaded payload harvests sensitive credentials, including SSH keys, AWS/GCP/Azure credentials, Kubernetes tokens, Docker configurations, .env files, database credentials, and crypto wallets.</li>
<li>If Kubernetes access is detected, the malware deploys privileged pods to all nodes for lateral movement within the Kubernetes cluster.</li>
<li>The collected data is encrypted using AES-256-CBC and RSA-4096, then exfiltrated to the C2 server, identified by the header <code>X-Filename: tpcp.tar.gz</code>.</li>
<li>On Windows, a binary payload hidden in <code>hangup.wav</code> is downloaded from <code>http://83.142.209.203:8080/</code>, dropped as <code>msbuild.exe</code> in the Startup folder for persistence, and executed with a hidden window, polling the endpoint <code>http://83.142.209.203:8080/raw</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The compromise of the <code>telnyx</code> PyPI package poses a significant risk to developers and organizations that use the library.  Successful exploitation leads to the theft of sensitive credentials, potentially granting the attacker unauthorized access to critical infrastructure, cloud resources, and sensitive data. TeamPCP&rsquo;s previous campaign against LiteLLM and the similarities in this attack suggest a pattern of targeting open-source projects to infiltrate developer environments and steal secrets.  The impact includes potential data breaches, financial losses, and reputational damage. The exposure window was approximately 6 hours during which vulnerable versions were available.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately check for the presence of malicious <code>telnyx</code> package versions (4.87.1 or 4.87.2) in your environment using the provided commands and uninstall them (<code>pip uninstall telnyx</code>).</li>
<li>Due to the credential-stealing nature of the malware, rotate all potentially exposed secrets, including SSH keys, cloud provider credentials (AWS, GCP, Azure), Kubernetes tokens, Docker registry credentials, database passwords, API keys in .env files, and Telnyx API keys.</li>
<li>Check for persistence mechanisms used by the malware, specifically the <code>audiomon</code> service and associated files on Linux/macOS, and the <code>msbuild.exe</code> executable in the Startup folder on Windows, based on the file paths provided in the &ldquo;Filesystem&rdquo; section.</li>
<li>Block the identified C2 IP address (<code>83.142.209.203</code>) and payload URLs (<code>http://83.142.209.203:8080/ringtone.wav</code>, <code>http://83.142.209.203:8080/hangup.wav</code>, <code>http://83.142.209.203:8080/raw</code>) at your network perimeter.</li>
<li>Deploy the following Sigma rule to detect the creation of <code>msbuild.exe</code> in the Startup folder.</li>
<li>Pin the <code>telnyx</code> package to the safe version 4.87.0 in your project dependencies to prevent future installations of compromised versions.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>supply-chain</category><category>pypi</category><category>credential-theft</category><category>teampcp</category></item><item><title>TeamPCP's CanisterWorm Kubernetes Wiper Targeting Iran</title><link>https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</link><pubDate>Mon, 23 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-canisterworm-kubernetes-wiper/</guid><description>TeamPCP's CanisterWorm is a newly identified Kubernetes wiper targeting Iranian infrastructure, indicating a politically motivated destructive attack.</description><content:encoded><![CDATA[<p>TeamPCP has deployed a Kubernetes wiper named CanisterWorm, specifically targeting Iranian infrastructure. This destructive malware is designed to obliterate data within Kubernetes environments. The wiper&rsquo;s emergence in March 2026 signals a heightened level of cyber aggression, particularly given the geopolitical context. Defenders need to be aware of the potential for significant operational disruption and data loss. The targeting of Kubernetes environments reflects a sophisticated understanding of modern infrastructure and the increasing reliance on containerization technologies. This campaign requires immediate attention and proactive security measures to mitigate the risk of successful attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a node within the Kubernetes cluster, possibly via exploiting a known vulnerability or through compromised credentials.</li>
<li>CanisterWorm gains elevated privileges within the compromised node, potentially using techniques such as privilege escalation exploits.</li>
<li>Discovery of other nodes and resources within the Kubernetes cluster through reconnaissance activities, leveraging the Kubernetes API.</li>
<li>Lateral movement to other nodes using stolen credentials or by exploiting trust relationships between nodes.</li>
<li>Execution of CanisterWorm on each targeted node, initiating the data wiping process.</li>
<li>Overwriting critical system files and data volumes within the containers and pods.</li>
<li>Corruption of Kubernetes configuration files, leading to instability and potential cluster failure.</li>
<li>Final stage involves the complete destruction of data within the Kubernetes environment, rendering the affected systems unusable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The successful deployment of CanisterWorm results in widespread data loss and service disruption within the targeted Kubernetes environments. This can lead to significant financial losses, reputational damage, and operational downtime. Given the targeting of Iranian infrastructure, this attack has the potential to impact critical services and government operations. The complete destruction of data necessitates extensive recovery efforts and may result in permanent data loss if backups are not available or are also compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor Kubernetes API server logs for suspicious activity, particularly attempts to list or access sensitive resources to detect reconnaissance (reference: Attack Chain step 3).</li>
<li>Implement network segmentation and strict access controls within the Kubernetes cluster to limit lateral movement (reference: Attack Chain step 4).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Kubernetes Pod Deletion</code> to identify potential wipe attempts.</li>
<li>Review and harden Kubernetes security configurations, including RBAC (Role-Based Access Control) policies, to prevent unauthorized access (reference: Attack Chain step 2).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>kubernetes</category><category>wiper</category><category>iran</category><category>canisterworm</category><category>teampcp</category><category>destructive-attack</category></item></channel></rss>