Cyber Threat Brief — March 29 2026

⚠️ This report is AI-generated. Always validate findings.

1. TeamPCP Compromises Telnyx PyPI Package — WAV Steganography Credential Stealer

TL;DR: TeamPCP published backdoored telnyx versions 4.87.1–4.87.2 to PyPI on March 27, hiding a credential harvester inside WAV audio files downloaded from C2. This is the third ecosystem hit (after Trivy/GitHub Actions, litellm/PyPI, and CanisterWorm/npm) in the cascading supply chain campaign.

What’s New:

  • Malicious code injected into telnyx/_client.py executes at import time — no user interaction required
  • Windows path: downloads hangup.wav from 83.142.209[.]203:8080, XOR-decodes executable from audio frames, drops as msbuild.exe in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
  • Linux/macOS path: downloads ringtone.wav from same C2, XOR-decodes third-stage collector script, runs via sys.executable, encrypts output with AES-256-CBC, exfils as tpcp.tar.gz via HTTP POST
  • Credential vector: compromised litellm CI tokens likely used to access Telnyx PyPI publishing credentials (cascading token theft)
  • Package quarantined; 742K total downloads for telnyx; no corresponding GitHub releases/tags for malicious versions

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
83.142.209[.]203:8080C2 IPT1071.001Firewall/proxy logsBlock
hangup.wav, ringtone.wav (from C2)Payload deliveryT1027.003 (Steganography)HTTP logsAlert on WAV downloads from non-CDN IPs
msbuild.exe in %APPDATA%\...\Startup\PersistenceT1547.001Sysmon (EID 11), EDRHunt for msbuild.exe outside C:\Windows\Microsoft.NET\
tpcp.tar.gz HTTP POST to C2ExfiltrationT1041Proxy/firewall logsAlert
telnyx==4.87.1, telnyx==4.87.2Malicious packageT1195.002Package manager logs, pip freezeAudit all environments; downgrade to 4.87.0
telnyx/_client.py modificationCode injectionT1059.006File integrity monitoringDiff against known-good
Process: sys.executable piped stdin executionExecutionT1059.006Sysmon (EID 1), auditdHunt for Python spawning with piped stdin

Detection

SourceRuleGap
Splunk ESCUNoneNeed rule for msbuild.exe in Startup folder outside .NET path
ElasticStartup Folder Persistence (generic)No WAV steganography or PyPI-specific indicators
Sigmaproc_creation_win_susp_msbuild.yml (partial)Matches msbuild execution but not Startup folder drop; no Linux coverage for piped stdin Python execution

Sources: Datadog Security Labs, BleepingComputer, Aikido, GitHub Issue #235


2. Citrix NetScaler CVE-2026-3055 — Active Reconnaissance Escalates to SAML IdP Fingerprinting

TL;DR: Threat actors are now actively probing the /cgi/GetAuthMethods endpoint on NetScaler ADC/Gateway instances to fingerprint SAML IdP configurations, building targeted hit lists for imminent CVE-2026-3055 (CVSS 9.3) memory overread exploitation. Successful exploitation leaks session cookies, private keys, and plaintext credentials.

What’s New:

  • Defused Cyber and watchTowr independently confirmed active auth-method fingerprinting in honeypot networks (reported March 28)
  • Attackers send HTTP POST requests to /cgi/GetAuthMethods to enumerate authentication flows and confirm SAML IdP configuration
  • Successful exploitation leaks: session cookies (bypassing MFA), private cryptographic keys, and plaintext user credentials from appliance memory
  • No confirmed in-the-wild exploitation of the memory overread itself yet — but shift from recon to exploitation is historically rapid for NetScaler vulns
  • Affected: 14.1 < 14.1-66.59, 13.1 < 13.1-62.23, 13.1-FIPS/NDcPP < 13.1-37.262

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST /cgi/GetAuthMethodsRecon probeT1595.002NetScaler web access logsAlert on high-volume requests from external IPs
SAML IdP configuration exposureTarget identificationT1592.004NetScaler config auditVerify SAML IdP is required; disable if not needed
Session cookies in memory overread responseCredential theftT1539NetScaler audit logsMonitor for anomalous session reuse post-patch
Private key material in overreadKey compromiseT1552.004Certificate managementRotate TLS certs/keys after patching
CVE-2026-4368 companion XSSReflected XSST1189WAF logsBlock XSS payloads targeting NetScaler login pages

Detection

SourceRuleGap
Splunk ESCUNoneNo rule for GetAuthMethods enumeration or NetScaler memory overread indicators
ElasticNoneNo NetScaler-specific detection content
Sigmaweb_cve_2023_citrix_bleed.yml (template only)Needs adaptation for CVE-2026-3055; /cgi/GetAuthMethods not covered

Sources: The Hacker News, Rapid7, Arctic Wolf, [Defused Cyber / watchTowr honeypot telemetry]


Status Updates

  • CVE-2025-53521 (F5 BIG-IP APM): Federal deadline is tomorrow (March 30). UNC5221 BRICKSTORM exploitation ongoing. No new IOCs. March 28 brief.
  • CVE-2026-4681 (PTC Windchill): Still no patch available. PTC imminent exploitation warning remains active. Monitor for GW.class, payload.bin, dpr_*.jsp. March 27 brief.
  • CVE-2026-20131 (Cisco FMC): Interlock ransomware exploitation ongoing. PoC public. No new artifacts since March 21. March 19 brief.
  • CVE-2026-33017 (Langflow): CISA KEV since March 25, federal deadline April 8. Exploitation ongoing per Sysdig. March 21 brief.
  • CVE-2026-33634 (Aqua Trivy supply chain): TeamPCP campaign continues expanding — see Telnyx entry above for latest ecosystem hit. March 27 brief.