Breaking News

Sony Announces the Launch of Xperia 1 VIII Kioxia Unveils High Performance KIOXIA XG10 Series SSDs for PC OEMs AMD Expands AMD Ryzen PRO 9000 Series Processor Lineup Thypoch enters autofocus market with Voyager 24-50mm f/2.8 for Sony E-mount PlayStation Plus Game Catalog for May 2026

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Telegram Messenger Vulnerability Spread Multipurpose Malware

Telegram Messenger Vulnerability Spread Multipurpose Malware

Enterprise & IT Feb 13,2018 0

Kaspersky Lab researchers have uncovered attacks being carried out by a new piece of malware using a zero-day vulnerability in the Telegram Desktop app.

The vulnerability was used to deliver multipurpose malware, which depending on the computer can be used either as a backdoor or as a tool to deliver mining software. According to the research, the vulnerability has been actively exploited since March 2017 for the cryptocurrency mining functionality, including Monero, Zcash, etc.

According to the research, the Telegram zero-day vulnerability was based on the RLO (right-to-left override) Unicode method. It is generally used for coding languages that are written from right to left, like Arabic or Hebrew. Besides that, however, it can also be used by malware creators to mislead users into downloading malicious files disguised, for example, as images.

Attackers used a hidden Unicode character in the file name that reversed the order of the characters, thus renaming the file itself. As a result, users downloaded hidden malware which was then installed on their computers. Kaspersky Lab reported the vulnerability to Telegram and the zero-day flaw has not since been observed in messenger's products.

During their analysis, Kaspersky Lab experts identified several scenarios of zero-day exploitation in the wild by threat actors. Firstly, the vulnerability was exploited to deliver mining malware. By using the victim's PC computing power, cybercriminals have been creating different types of cryptocurrency including Monero, Zcash, Fantomcoin and others. Moreover, while analyzing a threat actor's servers, Kaspersky Lab researchers found archives containing a Telegram local cache that had been stolen from victims.

Secondly, upon successful exploitation of the vulnerability, a backdoor that used the Telegram API as a command and control protocol was installed, resulting in the hackers gaining remote access to the victim's computer. After installation, it started to operate in a silent mode, which allowed the threat actor to remain unnoticed in the network and execute different commands including the further installation of spyware tools.

The artefacts discovered during the research indicate Russian origins of cybercriminals, Kaspersky added.

Tags: malware
Previous Post
Arm's Project Trillium Offers Scalable, Machine Learning Compute Platform
Next Post
UK Uses Machine Learning to Fight Terrorist Content Online

Related Posts

  • Intel and Microsoft Convert Malware to Images to Spot Threads Faster

  • Malwarebytes Outlines Coronavirus Scams

  • Google's AI Tool Scans Billions of Gmail Attachments to Secure Inboxes

  • Pentagon, DHS And FBI Issued New Malware Warning For Windows Users

  • Lazarus Group Targets Linux With New Malware

  • Hackers Targeted Government Officials Using WhatsApp Malware

  • Malware Masked as Textbooks and Essays

  • Samsung Laptop Full of Notorious Malware Is On Sale For $1.2M

Latest News

Sony Announces the Launch of Xperia 1 VIII
Smartphones

Sony Announces the Launch of Xperia 1 VIII

Kioxia Unveils High Performance KIOXIA XG10 Series SSDs for PC OEMs
Enterprise & IT

Kioxia Unveils High Performance KIOXIA XG10 Series SSDs for PC OEMs

AMD Expands AMD Ryzen PRO 9000 Series Processor Lineup
PC components

AMD Expands AMD Ryzen PRO 9000 Series Processor Lineup

Thypoch enters autofocus market with Voyager 24-50mm f/2.8 for Sony E-mount
Cameras

Thypoch enters autofocus market with Voyager 24-50mm f/2.8 for Sony E-mount

PlayStation Plus Game Catalog for May 2026
Gaming

PlayStation Plus Game Catalog for May 2026

Popular Reviews

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

Soft2bet and the unseen hardware that makes instant play possible

Soft2bet and the unseen hardware that makes instant play possible

Crucial T710 2TB NVME SSD

Crucial T710 2TB NVME SSD

JSAUX 65Wh Rog Ally Battery

JSAUX 65Wh Rog Ally Battery

Endorfy Thock V2 Wireless Keyboard

Endorfy Thock V2 Wireless Keyboard

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed