Russian Malware Compromises Telegram Chats

Newly discovered malware has taken advantage of security weaknesses in the desktop client used by the Telegram encrypted communications service to steal previous chats and other information.

While the “TeleGrab” malware has not so far operated on a large scale, researchers at Cisco’s Talos security group said it should be a “wake-up call” for individuals using encrypted communications programs.

“Features which are not clearly explained and bad defaults can put in jeopardy their privacy,” wrote Cisco’s Vitor Ventura and Azim Khodjibaev in an advisory. “This shows how a small operation can fly under the radar and compromise thousands of credentials in less than a month.”

The researchers discovered two versions of TeleGrab in April, one of which only looked for Chrome browser cookies and session credentials, along with text files. The second added the ability to collect cache and key files for the Telegram desktop application.

Credit: Cisco Talos

Session hijack

“This attack does allow session hijacking and with it the victim’s contacts and previous chats are compromised,” Ventura and Khodjibaev wrote.

The malware doesn’t exploit a vulnerability in Telegram, instead taking advantage of the fact that the desktop version of the client doesn’t support Secret Chats, which are end-to-end encrypted, and settings that don’t log the user out by default.

“These two elements together are what allows the malware to hijack the session and consequently the conversations,” the Cisco advisory said.

They added that the technique doesn’t affect encrypted conversations on the mobile platform.

Cisco found a tutorial video explaining how to use the information stolen by TeleGrabber to hijack Telegram sessions, “by restoring cache and map files into an existing Telegram desktop installation, if the session was open”.

When that is done it is possible to access the target’s session, contacts and previous chats.

Cisco said it doesn’t know of a tool for decrypting the information, but said “it would not be hard” to create one.

Russian hacker

Telegram was founded by Russian entrepreneur Pavel Durov, and based on the instructional video Cisco said it believes the hacker is a native Russian speaker.

Cisco found various online postings in hacker forums related to the malware, including a video posted on the Russian site lolzteam.net called “Telegram breaking in 2018”.

The video was posted with the username “Raccoon Pogromist”, Cisco said.

The malware is being distributed via several different downloaders, according to the advisory, which outlined ways security software can be set up to block the attack.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago