09-20-2023, 04:53 AM
Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that's designed to harvest sensitive information from compromised Android devices.
According to Kaspersky security researcher Igor Golovin, the apps come with nefarious features to capture and exfiltrate names, user IDs, contacts, phone numbers, and chat messages to an actor-controlled server.
The activity has been codenamed Evil Telegram by the Russian cybersecurity company.
The apps have been collectively downloaded millions of times before they were taken down by Google. Their details are as follows -
電報,紙飛機-TG繁體中文版 or 電報,小飛機-TG繁體中文版 (org.telegram.messenger.wab) - 10 million+ downloads
TG繁體中文版-電報,紙飛機 (org.telegram.messenger.wab) - 50,000+ downloads
电报,纸飞机-TG简体中文版 (org.telegram.messenger.wob) - 50,000+ downloads
电报,纸飞机-TG简体中文版 (org.tgcn.messenger.wob) - 10,000+ downloads
ئۇيغۇر تىلى TG - تېلېگرامما (org.telegram.messenger.wcb) - 100+ downloads
The last app on the list translates to "Telegram - TG Uyghur," indicating a clear attempt to target the Uyghur community.
It's worth noting that the package name associated with the Play Store version of Telegram is "org.telegram.messenger," whereas the package name for the APK file directly downloaded from Telegram's website is "org.telegram.messenger.web."
The use of "wab," "wcb," and "wob" for the malicious package names, therefore, highlights the threat actor's reliance on typosquatting techniques in order to pass off as the legitimate Telegram app and slip under the radar.
According to Kaspersky security researcher Igor Golovin, the apps come with nefarious features to capture and exfiltrate names, user IDs, contacts, phone numbers, and chat messages to an actor-controlled server.
The activity has been codenamed Evil Telegram by the Russian cybersecurity company.
The apps have been collectively downloaded millions of times before they were taken down by Google. Their details are as follows -
電報,紙飛機-TG繁體中文版 or 電報,小飛機-TG繁體中文版 (org.telegram.messenger.wab) - 10 million+ downloads
TG繁體中文版-電報,紙飛機 (org.telegram.messenger.wab) - 50,000+ downloads
电报,纸飞机-TG简体中文版 (org.telegram.messenger.wob) - 50,000+ downloads
电报,纸飞机-TG简体中文版 (org.tgcn.messenger.wob) - 10,000+ downloads
ئۇيغۇر تىلى TG - تېلېگرامما (org.telegram.messenger.wcb) - 100+ downloads
The last app on the list translates to "Telegram - TG Uyghur," indicating a clear attempt to target the Uyghur community.
It's worth noting that the package name associated with the Play Store version of Telegram is "org.telegram.messenger," whereas the package name for the APK file directly downloaded from Telegram's website is "org.telegram.messenger.web."
The use of "wab," "wcb," and "wob" for the malicious package names, therefore, highlights the threat actor's reliance on typosquatting techniques in order to pass off as the legitimate Telegram app and slip under the radar.
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Suspected Scamming | Contact us via http://breachedu76kdyavc6szj6ppbplfqoz3p...on/contact if you feel this is incorrect.
Ban Reason: Suspected Scamming | Contact us via http://breachedu76kdyavc6szj6ppbplfqoz3p...on/contact if you feel this is incorrect.