Redazione RHC : 23 Luglio 2024 12:23
ESET researchers have discovered a zero-day exploit targeting Telegram for Android. An exploit called EvilVideo appeared for sale on an underground forum on June 6, 2024. Attackers exploited this vulnerability to distribute malicious files through Telegram channels, groups, and chats, disguising them as media files.
Specialists managed to obtain an example of the exploit, which allowed them to analyze it and report the problem on Telegram on June 26. An update fixing the vulnerability was released on July 11, 2024 in Telegram versions 10.14.5 and later.
The vulnerability allowed attackers to send malicious files that looked like videos in unprotected versions of Telegram for Android (10.14.4 and earlier). The exploit was found on an underground forum, where the vendor demonstrated its work in a public Telegram channel.
Prova la Demo di Business Log! L'Adaptive SOC italiano
Log management non solo per la grande Azienda, ma una suite di Audit file, controllo USB, asset, sicurezza e un Security Operation Center PERSONALE, che ti riporta tutte le operazioni necessarie al tuo PC per tutelare i tuoi dati e informati in caso di problemi nel tuo ambiente privato o di lavoro.
Scarica ora la Demo di Business Log per 30gg
This allowed researchers to obtain the malicious file and test it.
The analysis showed that the exploit exploited the ability to create malicious files that were displayed as media previews. While attempting to play such a “video,” Telegram reported that the file could not be played and suggested using an external player.
By clicking the “Open” button, the user was asked to install a malicious application disguised as a player.
Telegram has fixed the vulnerability in version 10.14.5. Media file previews now correctly indicate that the file is an application and not a video.
The exploit was tested on the web and desktop versions of Telegram for Windows, but it did not work. In both cases, the file was recognized as multimedia and posed no threat.
It was also discovered that the exploit vendor offered an encryption service for Android, making malicious files invisible to antiviruses. This service has been advertised on the same underground forum since January 2024.
After discovering the vulnerability and reporting it to Telegram, the problem was fixed. Users are advised to update the application to the latest version to protect themselves from potential threats.
Negli ultimi giorni, il collettivo hacktivista italiano Anonymous Italia ha risposto agli attacchi informatici sferrati dal gruppo filorusso NoName057(16) colpendo una serie di obiettivi russi. Gli at...
Gruppo di ricerca MASSGRAVE ha presentato un Exploit chiamato TSforge che consente di attivare qualsiasi versione di Windows a partire da Windows 7, nonché tutte le edizioni di Microsof...
Su BreachForum un utente dallo pseudonimo EDRVendor ha venduto, dopo poche ore dall’annuncio, l’accesso ad una cassetta postale della polizia di stato italiana. Oltre alla mail viene off...
Team di intelligence sulle minacce di Google ha reso pubblica l’informazione sul gruppo di hacker Triplestrength, finora sconosciuto, attivo dal 2020. Il gruppo è composto da poc...
I canali Telegram degli hacker filorussi di NoName057(16) sono stati eliminati da telegram. Ma subito gli attivisti ricreano nuovi canali marchiati con il suffisso “reborn“. Ma...
Copyright @ 2003 – 2024 REDHOTCYBER Srl
PIVA 17898011006