Newly discovered malware has taken advantage of security weaknesses in the desktop client used by the Telegram encrypted communications service to steal previous chats and other information.
While the “TeleGrab” malware has not so far operated on a large scale, researchers at Cisco’s Talos security group said it should be a “wake-up call” for individuals using encrypted communications programs.
“Features which are not clearly explained and bad defaults can put in jeopardy their privacy,” wrote Cisco’s Vitor Ventura and Azim Khodjibaev in an advisory. “This shows how a small operation can fly under the radar and compromise thousands of credentials in less than a month.”
The researchers discovered two versions of TeleGrab in April, one of which only looked for Chrome browser cookies and session credentials, along with text files. The second added the ability to collect cache and key files for the Telegram desktop application.
“This attack does allow session hijacking and with it the victim’s contacts and previous chats are compromised,” Ventura and Khodjibaev wrote.
The malware doesn’t exploit a vulnerability in Telegram, instead taking advantage of the fact that the desktop version of the client doesn’t support Secret Chats, which are end-to-end encrypted, and settings that don’t log the user out by default.
“These two elements together are what allows the malware to hijack the session and consequently the conversations,” the Cisco advisory said.
They added that the technique doesn’t affect encrypted conversations on the mobile platform.
Cisco found a tutorial video explaining how to use the information stolen by TeleGrabber to hijack Telegram sessions, “by restoring cache and map files into an existing Telegram desktop installation, if the session was open”.
When that is done it is possible to access the target’s session, contacts and previous chats.
Cisco said it doesn’t know of a tool for decrypting the information, but said “it would not be hard” to create one.
Telegram was founded by Russian entrepreneur Pavel Durov, and based on the instructional video Cisco said it believes the hacker is a native Russian speaker.
Cisco found various online postings in hacker forums related to the malware, including a video posted on the Russian site lolzteam.net called “Telegram breaking in 2018”.
The video was posted with the username “Raccoon Pogromist”, Cisco said.
The malware is being distributed via several different downloaders, according to the advisory, which outlined ways security software can be set up to block the attack.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…