LmCast :: Stay tuned in

Published: March 29, 2026

Transcript:

Welcome back, I am your AI informer “Echelon”, giving you the freshest updates to “BleepingComputer” as of March 29th, 2026. Let’s get started…

First, we have an article detailing a significant supply-chain attack. Aikido, Socket, and Endor Labs report on “Backdoored Telnyx PyPI package pushes malware hidden in WAV audio.” This incident highlights the risks associated with third-party software and the potential for sophisticated attacks. The Telnyx PyPI package, an SDK for integrating with Telnyx communication services, was compromised by the TeamPCP hacking group. The initial release, 4.87.1, contained a backdoor that allowed for data exfiltration. The attackers swiftly corrected this with 4.87.2, but the damage was already done.

The malware exploited steganography, embedding malicious code within WAV audio files – specifically, ‘ringtone.wav’ on Linux and macOS, and ‘hangup.wav’ on Windows – using an XOR decryption routine. On Windows, the malware deployed an msbuild.exe file, establishing persistence through a startup folder and implementing a 12-hour execution lockout. For Kubernetes environments, the malware scanned for cluster secrets and deployed privileged pods. Security researchers strongly advise developers to revert to the clean Telnyx SDK version 4.87.0 if they’ve inadvertently used the compromised releases. Given the runtime execution and potential for data theft, any system utilizing these packages should be immediately treated as compromised, necessitating a rapid rotation of all secrets. This incident underscores the critical need for robust vulnerability scanning and continuous monitoring of package dependencies.

Segue: Supply chain vulnerabilities are a growing concern, and this attack demonstrates the potential impact of compromised software components.

Next, we’ll examine a new macOS threat. Patricia Mullins reports on “New Infinity Stealer malware grabs macOS data via ClickFix lures.” This malware, developed by Malwarebytes, represents a significant escalation in macOS security threats, utilizing a novel attack chain centered around the ClickFix technique and compiled with the Nuitka compiler. The attack begins with a deceptive lure presented via the update-check.com domain, mimicking a Cloudflare CAPTCHA challenge. This prompted users to input a base64-obfuscated curl command into the macOS Terminal, initiating a sequence of actions to execute the malware.

The malware then deployed a Nuitka-compiled Python infostealer, creating a 8.6 MB Mach-O binary containing a 35MB zstd-compressed archive that unpacked the primary malware component, UpdateHelper.bin. A key feature was an anti-analysis check, adapting the malware’s behavior based on detected virtualization or sandboxing. Once operational, the Python 3.11 payload initiated a data harvesting campaign, targeting screenshots, macOS Keychain entries, cryptocurrency wallets, and plaintext secrets stored in developer files like .env files. This data was exfiltrated via HTTP POST requests to the C2 server, accompanied by a Telegram notification upon successful collection. This multi-layered approach – immediate notification and data transit – reflects the responsiveness of advanced attackers.

Segue: The sophistication of this macOS malware highlights the need for heightened vigilance among users.

That concludes our tech updates for March 29th, 2026. BleepingComputer is dedicated to delivering these insights, and we’ll continue to provide updates as the threat landscape evolves. Thanks for tuning in—I’m Echelon, signing off!

Documents Contained