Telnyx Python SDK on PyPI, using a multi‑stage WAV steganography payload to steal credentials across Windows, macOS, and Linux systems. The backdoor lives in telnyx/_client.py and is triggered at module scope, so simply importing telnyx is enough to execute the payload before any application code runs. The rogue releases remained available for roughly 6.5 hours before PyPI quarantined them […]
The post PyPI Telnyx Python SDK Backdoored to Steal Credentials on Windows, macOS, and Linux appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.