Breaking News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series TEAMGROUP Launches EXPERT P34F Find My External SSD NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025 Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Telegram Messenger Vulnerability Spread Multipurpose Malware

Telegram Messenger Vulnerability Spread Multipurpose Malware

Enterprise & IT Feb 13,2018 0

Kaspersky Lab researchers have uncovered attacks being carried out by a new piece of malware using a zero-day vulnerability in the Telegram Desktop app.

The vulnerability was used to deliver multipurpose malware, which depending on the computer can be used either as a backdoor or as a tool to deliver mining software. According to the research, the vulnerability has been actively exploited since March 2017 for the cryptocurrency mining functionality, including Monero, Zcash, etc.

According to the research, the Telegram zero-day vulnerability was based on the RLO (right-to-left override) Unicode method. It is generally used for coding languages that are written from right to left, like Arabic or Hebrew. Besides that, however, it can also be used by malware creators to mislead users into downloading malicious files disguised, for example, as images.

Attackers used a hidden Unicode character in the file name that reversed the order of the characters, thus renaming the file itself. As a result, users downloaded hidden malware which was then installed on their computers. Kaspersky Lab reported the vulnerability to Telegram and the zero-day flaw has not since been observed in messenger's products.

During their analysis, Kaspersky Lab experts identified several scenarios of zero-day exploitation in the wild by threat actors. Firstly, the vulnerability was exploited to deliver mining malware. By using the victim's PC computing power, cybercriminals have been creating different types of cryptocurrency including Monero, Zcash, Fantomcoin and others. Moreover, while analyzing a threat actor's servers, Kaspersky Lab researchers found archives containing a Telegram local cache that had been stolen from victims.

Secondly, upon successful exploitation of the vulnerability, a backdoor that used the Telegram API as a command and control protocol was installed, resulting in the hackers gaining remote access to the victim's computer. After installation, it started to operate in a silent mode, which allowed the threat actor to remain unnoticed in the network and execute different commands including the further installation of spyware tools.

The artefacts discovered during the research indicate Russian origins of cybercriminals, Kaspersky added.

Tags: malware
Previous Post
Arm's Project Trillium Offers Scalable, Machine Learning Compute Platform
Next Post
UK Uses Machine Learning to Fight Terrorist Content Online

Related Posts

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Malwarebytes Outlines Coronavirus Scams

  • Google's AI Tool Scans Billions of Gmail Attachments to Secure Inboxes

  • Pentagon, DHS And FBI Issued New Malware Warning For Windows Users

  • Lazarus Group Targets Linux With New Malware

  • Hackers Targeted Government Officials Using WhatsApp Malware

  • Malware Masked as Textbooks and Essays

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

Latest News

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series
Smartphones

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series

TEAMGROUP Launches EXPERT P34F Find My External SSD
Consumer Electronics

TEAMGROUP Launches EXPERT P34F Find My External SSD

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA
Cameras

NIKON RELEASES A NEW SILVER EDITION OF THE Z F FULL-FRAME MIRRORLESS CAMERA

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025
Gaming

JSAUX Showcases Upcoming Switch 2 Ecosystem Solutions Ahead of IFA Berlin 2025

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities
Cameras

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

Noctua NH-D15 G2

Noctua NH-D15 G2

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed