By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Telegram App Flaw Exploited to Spread Malware Hidden in Videos
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Telegram App Flaw Exploited to Spread Malware Hidden in Videos
Tech News

Telegram App Flaw Exploited to Spread Malware Hidden in Videos

By Viral Trending Content 7 Min Read
Share
SHARE
Telegram App

A zero-day security flaw in Telegram’s mobile app for Android called EvilVideo made it possible for attackers to malicious files disguised as harmless-looking videos.

Contents
Hamster Kombat’s Viral Success Spawns Malicious CopycatBadPack Android Malware Slips Through the Cracks

The exploit appeared for sale for an unknown price in an underground forum on June 6, 2024, ESET said. Following responsible disclosure on June 26, the issue was addressed by Telegram in version 10.14.5 released on July 11.

“Attackers could share malicious Android payloads via Telegram channels, groups, and chat, and make them appear as multimedia files,” security researcher Lukáš Štefanko said in a report.

It’s believed that the payload is concocted using Telegram’s application programming interface (API), which allows for programmatic uploads of multimedia files to chats and channels. In doing so, it enables an attacker to camouflage a malicious APK file as a 30-second video.

Users who click on the video are displayed an actual warning message stating the video cannot be played and urges them to try playing it using an external player. Should they proceed with the step, they are subsequently asked to allow installation of the APK file through Telegram. The app in question is named “xHamster Premium Mod.”

Cybersecurity

“By default, media files received via Telegram are set to download automatically,” Štefanko said. “This means that users with the option enabled will automatically download the malicious payload once they open the conversation where it was shared.”

While this option can be disabled manually, the payload can still be downloaded by tapping the download button accompanying the supposed video. It’s worth noting that the attack does not work on Telegram clients for the web or the dedicated Windows app.

It’s currently not clear who is behind the exploit and how widely it was used in real-world attacks. The same actor, however, advertised in January 2024 a fully undetectable Android crypter (aka cryptor) that can reportedly bypass Google Play Protect.

Hamster Kombat’s Viral Success Spawns Malicious Copycat

The development comes as cyber criminals are capitalizing on the Telegram-based cryptocurrency game Hamster Kombat for monetary gain, with ESET discovering fake app stores promoting the app, GitHub repositories hosting Lumma Stealer for Windows under the guise of automation tools for the game, and an unofficial Telegram channel that’s used to distribute an Android trojan called Ratel.

The popular game, which launched in March 2024, is estimated to have more than 250 million players, according to the game developer. Telegram CEO Pavel Durov has called Hamster Kombat the “fastest-growing digital service in the world” and that “Hamster’s team will mint its token on TON, introducing the benefits of blockchain to hundreds of millions of people.”

Telegram App

Ratel, offered via a Telegram channel named “hamster_easy,” is designed to impersonate the game (“Hamster.apk”) and prompts users to grant it notification access and set itself as the default SMS application. It subsequently initiates contact with a remote server to get a phone number as response.

In the next step, the malware sends a Russian language SMS message to that phone number, likely belonging to the malware operators, to receive additional instructions over SMS.

“The threat actors then become capable of controlling the compromised device via SMS: The operator message can contain a text to be sent to a specified number, or even instruct the device to call the number,” ESET said. “The malware is also able to check the victim’s current banking account balance for Sberbank Russia by sending a message with the text баланс (translation: balance) to the number 900.”

Ratel abuses its notification access permissions to hide notifications from no less than 200 apps based on a hard-coded list embedded within it. It’s suspected that this is being done in an attempt to subscribe the victims to various premium services and prevent them from being alerted.

The Slovakian cybersecurity firm said it also spotted fake application storefronts claiming to offer Hamster Kombat for download, but actually directs users to unwanted ads, and GitHub repositories offering Hamster Kombat automation tools that deploy Lumma Stealer instead.

“The success of Hamster Kombat has also brought out cybercriminals, who have already started to deploy malware targeting the players of the game,” Štefanko and Peter Strýček said. “Hamster Kombat’s popularity makes it ripe for abuse, which means that it is highly likely that the game will attract more malicious actors in the future.”

BadPack Android Malware Slips Through the Cracks

Beyond Telegram, malicious APK files targeting Android devices have also taken the form of BadPack, which refer to specially crafted package files in which the header information used in the ZIP archive format has been altered in an attempt to obstruct static analysis.

In doing so, the idea is to prevent the AndroidManifest.xml file – a crucial file that provides essential information about the mobile application – from being extracted and properly parsed, thereby allowing malicious artifacts to be installed without raising any red flags.

This technique was extensively documented by Kaspersky earlier this April in connection with an Android trojan referred to as SoumniBot that has targeted users in South Korea. Telemetry data gathered by Palo Alto Networks Unit 42 from June 2023 through June 2024 has detected nearly 9,200 BadPack samples in the wild, although none of them have been found on Google Play Store.

“These tampered headers are a key feature of BadPack, and such samples typically pose a challenge for Android reverse engineering tools,” Unit 42 researcher Lee Wei Yeong said in a report published last week. “Many Android-based banking Trojans like BianLian, Cerberus and TeaBot use BadPack.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Can AI Solve Homelessness in Ireland?

How Anthropic’s Ralph Plugin Makes Claude Complete Coding Tasks

Best Streaming Service of the Year: Tech Advisor Awards 2025-26

Factor Meal Delivery Promo: Free $200 Withings Body-Scan Scale

IBM warns of critical API Connect auth bypass vulnerability

TAGGED: Android, API Security, cryptocurrency, Cyber Security, Cybersecurity, Game Security, Internet, Malware, mobile security, Online Safety, Telegram, Zero-Day
Share This Article
Facebook Twitter Copy Link
Previous Article Megadonors Send Millions to Trump, Biden Funds in June: Filings
Next Article Andrew Nembhard is signing a three-year, $59 million extension with the Indiana Pacers
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare
Gaming News
David Beckham–backed Prenetics abandons Bitcoin strategy to focus on core health business
Crypto
Who Was Isiah Whitlock Jr.? 5 Things to Know About ‘The Wire’ Alum Who Died
Celebrity
Here’s Why The Cardano Network And ADA Could Be A Dominant Force In 2026
Crypto
Can AI Solve Homelessness in Ireland?
Tech News
Starbucks CEO Brian Niccol says a Reddit thread about people interviewing at the company convinced him his ‘Back to Starbucks’ plan is working
Business
How Anthropic’s Ralph Plugin Makes Claude Complete Coding Tasks
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Sony's patent for PS5 AI tutorial 'ghosts' sound like a nightmare
December 31, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?