TeamPCP injected a cred stealer into two releases of the telnyx Python SDK on PyPI. The attack injects 74 lines of malicious code into a single file, telnyx/_client.py, which executes immediately on import telnyx. The payload is hidden inside a WAV audio file data subchunk which is fetched from attacker infrastructure at runtime, and decoded using base64 + XOR before execution. The malware is platform dependent and on Windows it drops a persistent binary disguised as msbuild.exe into the Startup folder for persistence across reboots.