Russian Malware Compromises Telegram Chats

Newly discovered malware has taken advantage of security weaknesses in the desktop client used by the Telegram encrypted communications service to steal previous chats and other information.

While the “TeleGrab” malware has not so far operated on a large scale, researchers at Cisco’s Talos security group said it should be a “wake-up call” for individuals using encrypted communications programs.

“Features which are not clearly explained and bad defaults can put in jeopardy their privacy,” wrote Cisco’s Vitor Ventura and Azim Khodjibaev in an advisory. “This shows how a small operation can fly under the radar and compromise thousands of credentials in less than a month.”

The researchers discovered two versions of TeleGrab in April, one of which only looked for Chrome browser cookies and session credentials, along with text files. The second added the ability to collect cache and key files for the Telegram desktop application.

Credit: Cisco Talos

Session hijack

“This attack does allow session hijacking and with it the victim’s contacts and previous chats are compromised,” Ventura and Khodjibaev wrote.

The malware doesn’t exploit a vulnerability in Telegram, instead taking advantage of the fact that the desktop version of the client doesn’t support Secret Chats, which are end-to-end encrypted, and settings that don’t log the user out by default.

“These two elements together are what allows the malware to hijack the session and consequently the conversations,” the Cisco advisory said.

They added that the technique doesn’t affect encrypted conversations on the mobile platform.

Cisco found a tutorial video explaining how to use the information stolen by TeleGrabber to hijack Telegram sessions, “by restoring cache and map files into an existing Telegram desktop installation, if the session was open”.

When that is done it is possible to access the target’s session, contacts and previous chats.

Cisco said it doesn’t know of a tool for decrypting the information, but said “it would not be hard” to create one.

Russian hacker

Telegram was founded by Russian entrepreneur Pavel Durov, and based on the instructional video Cisco said it believes the hacker is a native Russian speaker.

Cisco found various online postings in hacker forums related to the malware, including a video posted on the Russian site lolzteam.net called “Telegram breaking in 2018”.

The video was posted with the username “Raccoon Pogromist”, Cisco said.

The malware is being distributed via several different downloaders, according to the advisory, which outlined ways security software can be set up to block the attack.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

China’s YMTC Publishes Memory Patent Applications

US-sanctioned YMTC publishes nearly 20 memory patent applications, showcasing innovations in efficiency and chip construction

13 hours ago

CATL ‘In Talks’ For Controlling Stake In Nio’s Power Unit

Battery giant CATL reportedly in talks to buy controlling stake in unit of EV maker…

13 hours ago

BYD Launches Luxury Denza EV Brand In Europe

Chinese EV giant BYD launches high-end Denza brand in Europe to compete with Mercedes, BMW…

14 hours ago

US Power Utilities Receive Massive AI Data Centre Requests

US power companies say in some cases data centre requests exceed their peak demand or…

14 hours ago

Microsoft Ends Projects With Wicresoft In China

Some 2,000 support staff reportedly laid off as Microsoft ends China outsourcing deal with its…

15 hours ago

Singapore Banks Hit By Ransomware Data Breach

DBS, Bank of China Singapore say customer data compromised after printing services supplier hit by…

15 hours ago