Newly Discovered Malware Targets Telegram Desktop

  /     /     /  
Publicated : 22/11/2024   Category : security


Newly Discovered Malware Targets Telegram Desktop


Russian-speaking attacker behind new malware capable of lifting credentials, cookies, desktop cache, and key files.



A new form of malware has emerged targeting the desktop version of end-to-end encrypted instant messaging service Telegram.
Cisco Talos researchers attribute the malware to a Russian-speaking attacker with high confidence and say its mostly targeting Russian-speaking victims. They also found its intentionally avoiding IP addresses related to anonymizer services.
What stands out about the malware is not that it affects Telegram Desktop - its that it
only
affects Telegram Desktop, says Cisco Talos threat researcher Vitor Ventura. This is the first threat Talos has detected with the intent of hijacking Telegram Desktop sessions.
There are other information stealers in the wild, he explains. But this one, although it searches for other types of credentials, has a special focus on Telegram Desktop. We think its important to point out the fact that Telegram Desktop is not secure by default. And this is what the malware authors are taking advantage of.
The malware doesnt exploit a vulnerability in the Telegram service, researchers explain. Instead it abuses weak default settings and lack of Secret Chat support in Telegram Desktop. An attacker can access conversations between desktop and mobile users if the desktop user is infected with this malware; however, mobile-to-mobile conversations are protected.
Mobile-only Secret Chats have guaranteed security because they are bound to the device, locally stored, and equipped with self-destruction tools. These features arent on the desktop or Web versions, which store chats in the cloud and dont enable auto-logout by default.
The combination of cloud-based storage, and lack of auto-logout by default, enable this malware to hijack Telegram sessions and conversations.
When, What, Who
A first version of this malware was detected on April 4, 2018 stealing browser credentials, cookies, and all text files it can locate on the system. A second variant, spotted on April 10, added the ability to gather Telegram desktop cache, key files, and Steam website credentials. Its unusual to see attackers take Telegram Desktop data to hijack sessions, Ventura says.
This data allows an attacker to be able to access all contacts and previous chats as long as the owner doesnt log out, he continues. This is a privacy issue [and] accessing Telegram Desktop data is all about privacy and accessing confidential information.
The malwares operators use hardcoded pcloud.com accounts to store the information they take from Telegram. Because this data is not encrypted, anyone with access to the authors account credentials will have access to the stolen information.
Why snatch this type of data? While he doesnt know the specific motivation, Ventura explains how he and his colleague, Azim Khodjibaev,
determined
its Russian attribution. An analysis of the malware linked it to a user who goes by the name of Raccoon Hacker.
The two researchers combined Talos intelligence with online videos to pinpoint the malwares author, who posted several YouTube clips containing instructions on how to use files collected from Telegram to hijack targets ongoing sessions and package them for distribution. If a chat session is open, attackers can access the conversation, contacts, and previous chats.
A Need for Transparency
Ventura points out an opportunity to better inform Telegram users of the desktop versions shortcomings. During the installation process and start-up, he says, its never mentioned that chats are not as secure as they are on mobile, or that Secret Chats are not available. Telegram also doesnt specify its default setting doesnt allow sessions to expire.
Its understandable that an application prioritizes usability over security, but not acceptable in an application that claims to be a secure messaging platform, he says.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Newly Discovered Malware Targets Telegram Desktop