Telnyx package compromised on PyPI
Recorded: March 28, 2026, 4 a.m.
| Original | Summarized |
Telnyx Python SDK Security Notice: Malicious PyPI Versions Identified (March 2026)HomeVoice AIVoice APIeSIMRCSSpeech-to-TextText-to-speechSIP TrunkingSMS APIMobile VoiceView all solutionsHealthcareFinanceTravel and HospitalityLogistics and TransportationContact CenterInsuranceRetail and E-CommerceSales and MarketingServices and DiningView all pricingVoice AIVoice APIeSIMRCSSpeech-to-TextText-to-SpeechSIP TrunkingSMS APIGlobal NumbersIoT SIM CardOur NetworkMission Control PortalCustomer storiesGlobal coveragePartnersCareersEventsResource centerSupport centerAI TemplatesSETIDev DocsIntegrationsProductsSolutionsPricingWhy TelnyxResourcesDevelopersContact usLog inContact usLog inSign upOpen menuBack to blogTelnyxTelnyx Python SDK: Supply Chain Security NoticeUnauthorized versions of the Telnyx Python SDK were briefly published to PyPI as part of a broader supply chain attack. Learn which versions were affected, who is impacted, and the steps to secure your environment.By Telnyx TeamSummaryOn March 27, 2026 at 03:51:28 UTC, two unauthorized versions of the Telnyx Python SDK were published to PyPI: versions 4.87.1 and 4.87.2. Both versions contained malicious code. Both were quarantined by 10:13 UTC the same day.This incident is part of a broader supply chain campaign that has also affected Trivy, Checkmarx, and LiteLLM.The Telnyx platform, APIs, and infrastructure were not compromised. This incident was limited to the PyPI distribution channel for the Python SDK.Affected Versions Version Published telnyx==4.87.1 03:51:28 UTC, March 27, 2026 telnyx==4.87.2 Shortly after Both versions have been removed from PyPI.Who Is AffectedYou may be affected if:You installed or upgraded the telnyx Python package between 03:51 UTC and 10:13 UTC on March 27, 2026You ran pip install telnyx without pinning a version and received 4.87.1 or 4.87.2A dependency in your project pulled in telnyx as a transitive, unpinned dependencyWho Is NOT AffectedYou are running version 4.87.0 or earlierYou did not install or upgrade the telnyx package between 03:51 UTC and 10:13 UTC on March 27You are using the Telnyx REST API directly without the Python SDKHow to CheckRun the following command:pip show telnyx |
Telnyx disclosed a significant supply chain security incident that occurred on March 27, 2026, impacting the distribution of its Python Software Development Kit (SDK). The core of the matter revolves around the unauthorized publication of two malicious versions, 4.87.1 and 4.87.2, to the Python Package Index (PyPI). These versions contained deliberately inserted code designed to compromise systems utilizing the Telnyx Python SDK. The incident was swiftly contained by Telnyx, with the compromised versions removed from PyPI within approximately six hours of their initial publication. The severity of this event stems from its categorization as a supply chain attack, highlighting the vulnerability inherent in relying on third-party software components. The broader campaign encompassing Trivy, Checkmarx, and LiteLLM underscores the sophistication and coordinated nature of this malicious activity. Crucially, Telnyx emphasizes that the Telnyx platform itself, its APIs, and underlying infrastructure remained unaffected. The compromise was strictly limited to the distribution channel of the SDK through PyPI. The potential impact extends to organizations that utilized versions 4.87.1 or 4.87.2 of the Telnyx Python SDK without explicitly pinning a specific version. This lack of version control allowed an unmanaged pull of the compromised code. A critical diagnostic step recommended by Telnyx involves executing the `pip show telnyx` command; a result indicating 4.87.1 or 4.87.2 immediately flags the environment as compromised. Immediate remediation involves a forced downgrade to version 4.87.0 or earlier. In addition to the downgrade, affected users are urged to rotate all secrets associated with the compromised environment, including API keys, database credentials, and any tokens utilized across cloud providers or within SSH keys. Security audits should be conducted to identify and isolate any outbound connections to the identified Command and Control (C2) server, 83.142.209.203:8080, and to investigate potential exfiltration attempts, notably through WAV steganography payload delivery. Telnyx is actively investigating how their publishing credentials were accessed, and is referencing related incidents involving the compromise of Trivy and LiteLLM, indicating a potentially wider, sustained campaign. The organization’s response has focused on swiftly removing the malicious versions from PyPI and is collaborating with relevant authorities. The investigation continues, with additional Indicators of Compromise (IOCs) expected to be released as the scope of the attack is fully understood. It’s important to note that the SDK itself is a client library that wraps public APIs and does not possess privileged access to Telnyx infrastructure. The incident did not result in any access to customer data. For inquiries or assistance in determining if an environment was affected, users are directed to contact [email protected]. |