Hackers turn Telegram messenger into malware vector

Source Cryptopolitan
Hackers are now weaponizing Telegram messenger with malware to gain control over devices. According to reports, hackers are using a backdoor in a maliciously modified version of the Telegram X messenger. This backdoor grants them complete control over their victims’ accounts and allows them to operate without detection.

According to reports, the malware is sent into devices through deceptive in-app advertisements and third-party app stores that masquerade as legitimate dating and communication platforms. This threat represents a significant escalation in mobile malware distribution, with it spreading across 58,000 infected devices.

In addition, it has also spread across more than 3,000 smartphones, tablets, TV boxes, and some Android-based vehicle systems.

Hackers weaponize Telegram with malware to gain access

The report claims that the backdoor distribution started in 2024, with the hacker primarily targeting Brazilian and Indonesian users through Portuguese and Indonesian language templates. The victims come across advertisements within the mobile application, which redirect them to fake app catalogs featuring fake reviews and promotional banners advertising free video chats and dating opportunities. These fake websites deliver apps infused with malware that look the same as the legitimate ones.

Aside from the malicious websites, the backdoor has also infiltrated established third-party repositories, including APKPure, ApkSum, and AndroidP, where it is deceptively posted under the official messenger developer’s name despite having a different digital signature.

Analysts identified the malware as having an exceptional capability to steal confidential information, which includes login credentials, passwords, and complete chat histories. The backdoor also hides compromised account indicators by hiding third-party device connections from active Telegram session lists.

In addition, it is capable of removing or adding its victims to channels and chats without their approval, disguising these actions entirely, and transforming compromised accounts into tools for artificially inflating Telegram channel subscribers.

What sets it apart from conventional Android threats is its use of the Redis database for command-and-control operations. The earlier versions of the malware relied on traditional C2 servers, but the developers have integrated Redis-based commands.

Malware manipulates functionalities without detection

The report claims that the backdoor uses multiple techniques to manipulate messenger functionalities without being detected. For operations that won’t interfere with core app features, the hackers use already prepared mirrors of messenger methods, which are separate code blocks responsible for specific tasks within the Android program architecture.

This mirror allows the app to display phishing messages within windows that perfectly replicate the original Telegram X interfaces.

For other operations that require deeper integration, the malware uses the Xposed framework to modify the app methods, allowing abilities like hiding specific chats, concealing authorized devices, and intercepting clipboard contents. The backdoor malware uses the Redis channels and C2 servers to receive extensive commands, including uploading SMS, contacts, and clipboard contents whenever a user minimizes or restores the messenger window.

The clipboard monitoring is used by hackers to steal data, such as crypto wallet passwords, mnemonic phrases, or confidential business communications that were unknowingly exposed. The backdoor collects device information, installed application data, message histories, and authentication tokens, and transmits the information to the hackers every three minutes while maintaining the appearance of a normal Telegram messenger operation.

Get $50 free to trade crypto when you sign up to Bybit now

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Solana Price Forecast: SOL hits key resistance ahead of Bitwise, Grayscale Solana ETFs launchSolana (SOL) price edges higher by over 1% at press time on Tuesday, recovering on the announcement of Bitwise Solana Staking Exchange Traded Fund (ETF)  launching on Wednesday.
Author  FXStreet
10 hours ago
Solana (SOL) price edges higher by over 1% at press time on Tuesday, recovering on the announcement of Bitwise Solana Staking Exchange Traded Fund (ETF)  launching on Wednesday.
placeholder
AUD/JPY Price Forecast: Crucial upside barrier emerges near 100.00The AUD/JPY cross slumps to around 99.55 during the early European session on Tuesday.
Author  FXStreet
10 hours ago
The AUD/JPY cross slumps to around 99.55 during the early European session on Tuesday.
placeholder
Microsoft Q1 Earnings Preview: AI-Powered Cloud Growth Fuels Wall Street’s “Zero Sell” ConsensusMicrosoft has beaten EPS estimates in nine of the past ten quarters. If Q3 delivers strong results, it would mark the 10th consecutive beat.
Author  TradingKey
10 hours ago
Microsoft has beaten EPS estimates in nine of the past ten quarters. If Q3 delivers strong results, it would mark the 10th consecutive beat.
placeholder
Forex Today: USD weakens, Gold slumps below $4,000 as risk flows dominateAfter losing more than 3% on Monday, Gold was last seen losing about 1.2% on the day at $3,940.
Author  FXStreet
11 hours ago
After losing more than 3% on Monday, Gold was last seen losing about 1.2% on the day at $3,940.
placeholder
Pound Sterling outperforms on risk-on market sentimentThe Pound Sterling (GBP) trades higher against its major currency peers, except second-level safe-haven ones, on Tuesday.
Author  FXStreet
11 hours ago
The Pound Sterling (GBP) trades higher against its major currency peers, except second-level safe-haven ones, on Tuesday.
goTop
quote