Weaponized Telegram App Infected Over 60K Android Users

by Esmeralda McKenzie
Weaponized Telegram App Infected Over 60K Android Users

Weaponized Telegram App Infected Over 60K Android Users

Weaponized Telegram App

Telegram Messenger affords global, cloud-primarily based entirely rapid messaging with several aspects:-

  • Now not compulsory cease-to-cease-encryption
  • Video calling
  • VoIP
  • File sharing

Cybersecurity researchers at Securlist no longer too long within the past realized several Telegram mods on Google Play in varied languages (old Chinese, simplified Chinese, and Uighur), claiming to be the fastest apps with a global network of files centers.

zD2K6w88iRKKYnTNRPKJdnO MOJuA6S6AzDF4YHgeMYs sZZathLeNEPo816ioFPMpmcEqiABIi3pY1pbq zN Jp8xVXXzsfBjybsGsMld0r89CHt sGHqiRcmPav5J85kLZsoa a3gnj1KGtJnn6w
Telegram mods on Google Play (Source – Securelist)

Without reference to Google Play attempting out, Telegram mods pose risks; risk actors penetrate and sell their variations. Researchers analyzed one such mod, which looks the same to the distinctive Telegram upon open.

Malicious Telegram Apps

Examining the code finds a reputedly frequent Telegram mod, nonetheless a equipment named com.wsys stands out, prompting additional investigation into its functions.

nZh6 eUiA0O9ExHMYIDk7g COIQiAX 0ykRr1wNWUMpyJuyW5Pue5IL TWQq0Ji7H4yoiuVlHbQq
Suspicious com.wsys library (Source – Securelist)

Capabilities linked to com.wsys appear to acquire entry to user contacts, which raises suspicion, as it’s no longer fraction of the commonplace aspects.

The com.wsys library operates within the predominant speak class’s connected socket () map, gathering user files and connecting to a negate server upon app originate or yarn swap.

Customers bump into one other surprise when receiving a message: risk actors added the uploadTextMessageToService choice to the incoming message processing code, which is absent within the neat Telegram model.

79oZ53bTBCdWNMDs3vo89xu3 1H4Fj5ch18kjrxxvM 70rOevd MIFiZgPk7gro1OXSMojBgm tn9KZUntSiUrueFmrH
Malware processing incoming message (Source – Securelist)

Upon message reception, uploadTextMessageToService captures the following records to send it to the negate server by encrypting them into tgsync.s3:-

  • Chat particulars
  • Sender files

This vogue gathers the following user contact files, after which all sent to the negate server, including updates if the user modifications their name or number:-

  • IDs
  • Nicknames
  • Names
  • Telephone numbers

Moreover this, the app encrypts and forwards got or sent files to attackers’ accounts on popular cloud storage.

Recommendation

Novel attacks the spend of unofficial Telegram mods, particularly in China, dash past crypto pockets scams and ad fraud, posing as plump-fledged adware that closely mimics the distinctive Telegram code for Google Play security assessments.

Reliable stores don’t guarantee app security, so beware of third-occasion messenger mods, even on Google Play. Without reference to reporting the risk, some apps remain available for compile.

IOCs

Md5

  • 39df26099caf5d5edf264801a486e4ee
  • b9e9a29229a10deecc104654cb7c71ae
  • e0dab7efb9cea5b6a010c8c5fee1a285
  • Efcbcd6a2166745153c329fd2d486b3a
  • 8e878695aab7ab16e38265c3a5f17970
  • 65377fa1d86351c7bd353b51f68f6b80
  • 19f927386a03ce8d2866879513f37ea0
  • a0e197b9c359b89e48c3f0c01af21713
  • c7a8c3c78ac973785f700c537fbfcb00

С&C

  • sg[.]telegrnm[.]org

Retain informed in regards to the most recent Cyber Safety News by following us on Google News, Linkedin, Twitter, and Facebook.

Source credit : cybersecuritynews.com

Related Posts