SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, March 30th, 2026: More TeamPCP: telnyx; Netscaler Exploit; macOS ClickFix Fix; Windows Smart Install

Mar 30, 2026
Updates on a supply-chain campaign that added a malicious Telnyx package to PyPI. Discussion of a Citrix Netscaler memory overread exploit and active probing of vulnerable systems. A warning to assume compromise for unpatched SAML-configured Netscalers. Notes on macOS paste-click protections and Windows Smart Install app-source restrictions.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

PyPI Compromise Targets AI Integrations

  • TeamPCP supply-chain actors are expanding by compromising PyPI packages used by AI integrations.
  • Attackers replaced Telnyx's PyPI package, delivering OS-specific payloads (Windows, Linux, macOS) and even embedding code in WAV files to evade detection.
ADVICE

Pin PyPI Versions To Prevent Silent Supply Chain Changes

  • Use version pinning to avoid automatically pulling a newly published malicious PyPI release.
  • Johannes Ulrich warns only systems that install the new compromised Telnyx package after publication are affected, so pin known-good versions.
INSIGHT

Supply Chain Actors Feeding Ransomware Ecosystem

  • TeamPCP is linking with ransomware groups, acting as access brokers or selling credentials.
  • Johannes Ulrich notes their output may feed forums like Breach Forum to turn initial access into ransomware campaigns.
Get the Snipd Podcast app to discover more snips from this episode
Get the app