4.6 C
New York
Saturday, February 22, 2025

Telegram zero-day allowed sending malicious Android APKs as movies

Must read

A Telegram for Android zero-day vulnerability dubbed ‘EvilVideo’ allowed attackers to ship malicious Android APK payloads disguised as video information.

A danger actor named ‘Ancryno’ first started promoting the Telegram zero-day exploit on June 6, 2024, in a publish at the Russian-speaking XSS hacking discussion board, declaring the flaw existed in Telegram v10.14.4 and older.

ESET researchers came upon the flaw after a PoC demonstration used to be shared on a public Telegram channel, letting them download the malicious payload.

Threat actor selling the exploit on a hacking forum
Risk actor promoting the exploit on a hacking discussion board
Supply: ESET

ESET showed the exploit labored in Telegram v10.14.4 and older and named it ‘EvilVideo.’ ESET researcher Lukas Stefanko responsibly disclosed the flaw to Telegram on June 26 and once more on July 4, 2024.

- Advertisement -

Telegram spoke back on July 4, declaring they had been investigating the document after which patched the vulnerability in model 10.14.5, launched on July 11, 2024.

This implies the danger actors had no less than 5 weeks to milk the zero-day prior to it used to be patched.

Whilst it’s unclear if the flaw used to be actively exploited in assaults, ESET shared a command and regulate server (C2) utilized by the payloads at ‘infinityhackscharan.ddns[.]internet.’

BleepingComputer discovered two malicious APK information the usage of that C2 on VirusTotal [1, 2] that fake to be Avast Antivirus or an ‘xHamster Top class Mod.’

Telegram zero-day exploit

The EvilVideo zero-day flaw best labored on Telegram for Android and allowed attackers to create specifically crafted APK information that, when despatched to different customers on Telegram, seem as embedded movies.

ESET believes that the exploit makes use of the Telegram API to programmatically create a message that looks to turn a 30-second video.

APK file previewed as a video on Telegram
APK document previewed as a 30-sec clip
Supply: ESET

On its default environment, the Telegram app on Android mechanically downloads media information, so channel individuals obtain the payload on their software when they open the dialog.

- Advertisement -
See also  New 'Sneaky 2FA' Phishing Package Objectives Microsoft 365 Accounts with 2FA Code Bypass

For customers who’ve disabled the auto-download, a unmarried faucet at the video preview is sufficient to begin the document obtain.

When customers try to play the pretend video, Telegram suggests the usage of an exterior participant, which would possibly reason recipients to faucet the “Open” button and execute the payload.

Prompt to launch an external video player
Steered to release an exterior video participant
Supply: ESET

Subsequent, an extra step is needed: the sufferer should allow the set up of unknown apps from the software settings, permitting the malicious APK document to put in at the software.​

Final step adding friction in the exploit process
Step requiring the approval of APK set up
Supply: ESET

Despite the fact that the danger actor claims the exploit is “one-click,” the truth that it calls for a couple of clicks, steps, and explicit settings for a malicious payload to be achieved on a sufferer’s software considerably reduces the chance of a a success assault.

ESET examined the exploit on Telegram’s internet consumer and Telegram Desktop and located that it does not paintings there since the payload is handled as an MP4 video document.

Telegram’s repair in model 10.14.5 now shows the APK document appropriately within the preview, so recipients can now not be deceived by way of what would seem as video information.

In the event you just lately gained video information that asked an exterior app to play by means of Telegram, carry out a filesystem scan the usage of a cell safety suite to find and take away the payloads out of your software.

Usually, Telegram video information are saved in ‘/garage/emulated/0/Telegram/Telegram Video/’ (inside garage) or in ‘/garage/<SD Card ID>/Telegram/Telegram Video/’ (exterior garage).

- Advertisement -

ESET shared a video demonstrating the Telegram zero-day exploit, which can also be watched underneath.

See also  Hackers goal vital zero-day vulnerability in PTZ cameras


Related News

- Advertisement -
- Advertisement -

Latest News

- Advertisement -