Malware & RansomwareHIGH

Malware - Fake Telegram Site Distributes Multi-Stage Loader

🎯

Basically, a fake Telegram site tricks users into downloading dangerous software.

Quick Summary

A fake Telegram download site is spreading malware disguised as a legitimate installer. Users risk severe system compromises through simple URL typos. Stay vigilant and only download from verified sources.

What Happened

A new threat has emerged from a typosquatted website designed to look like the official Telegram download page. The site, hosted at telegrgam[.]com, masquerades as a legitimate portal, prompting users to download a Windows installer named tsetup-x64.6.exe. This installer is not what it seems; it is a malicious file that initiates a multi-stage loading process, allowing attackers to execute harmful code without detection.

The malware operates by modifying system settings and running commands in the background. It avoids traditional detection methods by executing its final payload directly in the system's memory, never writing it to disk. This stealthy approach makes it particularly dangerous, as many antivirus programs rely on scanning files stored on the disk to identify threats.

Who's Being Targeted

This campaign primarily targets everyday users who may not pay close attention to the URLs they visit. The attackers exploit the popularity of Telegram, a widely used messaging app, to lure victims into downloading the fake installer. By creating similar domain names, such as www.telefgram[.]com and www.tejlegram[.]com, they increase their chances of catching unsuspecting users who mistype the URL.

The risk is significant; a single mistake can lead to a full system compromise. Users searching for a popular app can easily fall victim to this visual deception, which is a reminder of how cybercriminals exploit human error rather than relying solely on technical vulnerabilities.

Signs of Infection

Once the malicious installer is executed, it begins by checking for existing infections and disabling real-time protection in Windows Defender. This is done through an obfuscated PowerShell command that excludes all drive partitions from scanning. The installer then drops several files into a location designed to mimic legitimate software folders, further obscuring its presence.

The core of the attack lies in how the malware executes its payload. It uses a technique called reflective loading, where the malicious code is reconstructed in memory and executed without ever being saved to disk. This makes it extremely difficult for traditional security tools to detect the threat, allowing it to operate undetected while maintaining a connection to a command-and-control server.

How to Protect Yourself

To defend against such threats, users should only download software from official and verified sources. Always double-check the URL before downloading any files. Keeping endpoint security tools updated and monitoring network traffic for unusual outbound connections are also effective strategies to detect and mitigate these types of threats.

In addition, users should be cautious about any unexpected prompts or changes in their system after installing software. By staying vigilant and informed, individuals can better protect themselves from these sophisticated malware attacks.

🔒 Pro insight: The use of in-memory execution techniques highlights the need for advanced detection capabilities in endpoint security solutions.

Original article from

Cyber Security News · Tushar Subhra Dutta

Read Full Article

Related Pings

CRITICALMalware & Ransomware

Interlock Ransomware - Exploiting Cisco FMC Zero-Day Flaw

A new ransomware campaign is exploiting a critical flaw in Cisco's software. Organizations using Cisco FMC are at risk of severe breaches. Immediate patching and security assessments are crucial to protect against this threat.

The Hacker News·
HIGHMalware & Ransomware

Ransomware - Marquis Reports Data Theft of 672K Individuals

Marquis, a Texas financial services firm, suffered a ransomware attack affecting over 670,000 individuals. The breach compromised sensitive personal data, raising serious security concerns. Affected individuals should monitor their accounts closely and take protective measures.

BleepingComputer·
HIGHMalware & Ransomware

Malware - New Campaigns Turn Devices Into DDoS and Mining Bots

New malware campaigns are hijacking network devices for DDoS attacks and crypto-mining. Routers and IoT devices are at risk, making immediate action essential. Protect your infrastructure to avoid exploitation.

Cyber Security News·
HIGHMalware & Ransomware

Malware - Iranian Hackers Used Stolen Credentials in Stryker Breach

A significant cyberattack on Stryker by Iranian hackers has disrupted operations globally. The attackers exploited stolen credentials, raising serious security concerns. Stryker is working to restore affected systems while authorities investigate the breach.

SecurityWeek·
HIGHMalware & Ransomware

Vidar Stealer 2.0 - Malware Delivered via Fake Game Cheats

A new malware campaign is exploiting fake game cheats on GitHub and Reddit to deliver Vidar 2.0. Gamers are at risk as they unknowingly install this dangerous infostealer. Stay informed and protect your data from these evolving threats.

Infosecurity Magazine·
HIGHMalware & Ransomware

Malware - GlassWorm Campaign Targets Python Repos via GitHub

A new malware campaign, ForceMemo, is targeting Python repositories on GitHub using stolen developer tokens. This poses a significant risk to developers and users alike. Vigilance is crucial to prevent compromise.

SC Media·