Malicious versions of the telnyx Python SDK (4.87.1, 4.87.2) were uploaded to PyPI. Code executes directly on import. It works cross-platform.
Delivery method is the interesting part. The package fetches a .wav file from C2, reads frame data, base64-decodes it, then XORs using the first few bytes as key to reconstruct the payload. File is valid audio, so it blends in and its pretty hard to detect by traditional methods.
Windows path drops msbuild.exe into Startup for persistence.
Linux/macOS path uses a staged Python loader → fetch WAV → extract second stage → execute via stdin → AES encrypt + exfil.
C2: 83.142.209.203:8080
Endpoints: /hangup.wav, /ringtone.wav
If you pulled those versions: downgrade, rotate secrets, and check for outbound traffic to that IP.