How Does Telegram Malware Bypass End-to-End Encryption

Other by Alicia on  Jan 14, 2022

Beware. A nefarious new threat utilizes Telegram to target you with harmful malware, even if you're not a Telegram user. If your computer is hacked, you risk data theft, spyware, ransomware, and even a whole system takeover. How to determine if you are infected is described here.

Messaging Apps and Malware Threat

Cybercriminals may use any messaging App to deliver harmful messages, attachments, and links. It would help if you always were cautious and suspicious of URLs and email attachments, even those coming from your close-knit circle of friends and family. The usual advice of not opening any links unless you are sure of their source and use still applies.

Telegram Scope and Characteristics

Telegram messenger, unlike its competitors, uses Artificially Intelligent bots to manage accounts. Unlike Facebook Messenger, Whatsapp, Signal, and iMessage, it is inherently complex, far more complicated than its main competitors.

Telegram utilizes AI-empowered bots in account management. These bots can perform various tasks such as connecting, training, setting reminders, and even transmitting commands to IoT ( Internet of Things). Regrettably, such bots are not limited to that. Hackers can also use them in attacks.

How Telegram Malware Bypass End-to-End Encryption

The attacker creates an account, then makes a telegram bot and inserts the bot token into the malicious source code before distributing the harmful sample via mail spam. When telegram users open the malicious attachment, the malicious bot is connected to the user's device, telegram RAT, and command and control.

Whether  Telegram is not installed or used, it enables hackers to execute malicious commands and operations remotely via the instant messaging app. Users are targeted via simple email campaigns. After a user's Windows PC opens a forged email attachment, the attached Telegram bot maintains the links back to the attacker's command and control server, effectively controlling the attack.

The Telegram malware, nicknamed Telegrab, primarily targets Russian-speaking users of the platform. Telegrab, the more hazardous variation of the Telegram malware, is spread by a self-extracting.RAR file, which examines the system for the default user's Chrome browser passwords and session cookies, including any.TXT files.

Additional executables are also dropped and executed by Telegrab to capture cache and encryption key files from the desktop version of Telegram and Steam login information. Afterward, the data is compressed and exfiltrated. An attacker can then gain access to the victims' session contacts and prior chats by restoring cache and map files into a Telegram desktop installation controlled by the attacker.

Telegrab does not exploit any weaknesses in the Telegram app; rather, it makes use of the fact that, unlike the mobile version, the desktop version of Telegram does not enable end-to-end encrypted chat via Secret Chats.

However, Telegram Desktop's auto-logout option is disabled by default, which means that hackers with access to a target computer can hijack Telegram sessions via the program's cache unless the user logs out manually.

Determining  Infection

A similar telegram malware identified as "ToxicEye," a novel remote access trojan, or RAT, can steal data or initiate a ransomware lockdown of a user's files and also hijack a computer's microphone and camera. Windows users can check their PCs for the presence of "C:UsersToxicEyerat.exe" to see if they have been infected. If you have that file, you should instantly delete it and contact your company's IT help desk if this is a work computer. If it's a PC at home, immediately install and run a high-quality antivirus product.

Protecting your iOS

Such details of malicious malware and how easily they can get to your phone or laptop calls for users to safeguard their devices. You need to install strong antivirus and use a VPN to stop others from eavesdropping on your online activity. It is essential to protect your PC by using VPN Chrome extension, especially the paid versions since they offer more features than freebies. Any software is susceptible to malware, and Apple products are no exception, even though the susceptibility level is lower than that of PCs. Although VPNs encrypt your data, you still need to be careful by using a safe browser and keeping your antivirus running.
 

Final Submission

Messaging Apps like Telegram have been used and are still being used to spread malware. The threat at the moment is high since malware can steal your data, delete your files, or stop you from using your files by locking them.

They may even spy on you by hijacking your video and audio. The worst is severe damage to your hardware and using your devices to send spam to your friends. To protect yourself, you need to use solid antimalware aside from frequent use of a VPN, especially when browsing on public Wi-Fi.

 

Alicia Veerle

Moderator, NoobFeed

Latest Articles

No Data.