Hackers turn Telegram messenger into malware vector

Source Cryptopolitan
Hackers are now weaponizing Telegram messenger with malware to gain control over devices. According to reports, hackers are using a backdoor in a maliciously modified version of the Telegram X messenger. This backdoor grants them complete control over their victims’ accounts and allows them to operate without detection.

According to reports, the malware is sent into devices through deceptive in-app advertisements and third-party app stores that masquerade as legitimate dating and communication platforms. This threat represents a significant escalation in mobile malware distribution, with it spreading across 58,000 infected devices.

In addition, it has also spread across more than 3,000 smartphones, tablets, TV boxes, and some Android-based vehicle systems.

Hackers weaponize Telegram with malware to gain access

The report claims that the backdoor distribution started in 2024, with the hacker primarily targeting Brazilian and Indonesian users through Portuguese and Indonesian language templates. The victims come across advertisements within the mobile application, which redirect them to fake app catalogs featuring fake reviews and promotional banners advertising free video chats and dating opportunities. These fake websites deliver apps infused with malware that look the same as the legitimate ones.

Aside from the malicious websites, the backdoor has also infiltrated established third-party repositories, including APKPure, ApkSum, and AndroidP, where it is deceptively posted under the official messenger developer’s name despite having a different digital signature.

Analysts identified the malware as having an exceptional capability to steal confidential information, which includes login credentials, passwords, and complete chat histories. The backdoor also hides compromised account indicators by hiding third-party device connections from active Telegram session lists.

In addition, it is capable of removing or adding its victims to channels and chats without their approval, disguising these actions entirely, and transforming compromised accounts into tools for artificially inflating Telegram channel subscribers.

What sets it apart from conventional Android threats is its use of the Redis database for command-and-control operations. The earlier versions of the malware relied on traditional C2 servers, but the developers have integrated Redis-based commands.

Malware manipulates functionalities without detection

The report claims that the backdoor uses multiple techniques to manipulate messenger functionalities without being detected. For operations that won’t interfere with core app features, the hackers use already prepared mirrors of messenger methods, which are separate code blocks responsible for specific tasks within the Android program architecture.

This mirror allows the app to display phishing messages within windows that perfectly replicate the original Telegram X interfaces.

For other operations that require deeper integration, the malware uses the Xposed framework to modify the app methods, allowing abilities like hiding specific chats, concealing authorized devices, and intercepting clipboard contents. The backdoor malware uses the Redis channels and C2 servers to receive extensive commands, including uploading SMS, contacts, and clipboard contents whenever a user minimizes or restores the messenger window.

The clipboard monitoring is used by hackers to steal data, such as crypto wallet passwords, mnemonic phrases, or confidential business communications that were unknowingly exposed. The backdoor collects device information, installed application data, message histories, and authentication tokens, and transmits the information to the hackers every three minutes while maintaining the appearance of a normal Telegram messenger operation.

Get $50 free to trade crypto when you sign up to Bybit now

Disclaimer: For information purposes only. Past performance is not indicative of future results.
placeholder
Ethereum (ETH) Price Closes Above $3,900 — Is a New All-Time High Possible Before 2024 Ends?Once again, the price of Ethereum (ETH) has risen above $3,900. This bounce has hinted at a further price increase for the altcoin before the end of the year.
Author  Beincrypto
Dec 17, 2024
Once again, the price of Ethereum (ETH) has risen above $3,900. This bounce has hinted at a further price increase for the altcoin before the end of the year.
placeholder
Bitcoin ETF Inflows For 2025 Now Outpace 2024, Data ShowsUS Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
Author  Bitcoinist
Jul 16, Wed
US Bitcoin spot exchange-traded funds (ETFs) have seen more inflows this year so far compared to the same point in 2024, according to data.
placeholder
Gold Price Forecast: XAU/USD gains momentum to near $3,650, eyes on US CPI releaseThe Gold price (XAU/USD) gains momentum to near $3,645 during the early Asian session on Thursday.
Author  FXStreet
Sep 11, Thu
The Gold price (XAU/USD) gains momentum to near $3,645 during the early Asian session on Thursday.
placeholder
What to expect from Ethereum in October 2025With broader sentiment worsening, user demand falling across the Ethereum network, and institutional investors pulling back, the coin faces mounting headwinds in October.
Author  Beincrypto
Sep 30, Tue
With broader sentiment worsening, user demand falling across the Ethereum network, and institutional investors pulling back, the coin faces mounting headwinds in October.
placeholder
Analysts compare Bitcoin to the Soybean crash, predict sharp moves aheadAnalyst notes that the BTC price movement mirrors the Soybean price ahead of its 1977 crash, when it declined 50% in value.
Author  FXStreet
Oct 22, Wed
Analyst notes that the BTC price movement mirrors the Soybean price ahead of its 1977 crash, when it declined 50% in value.
goTop
quote