News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Russian malware campaign
B2B Cyber ​​Security ShortNews

In September 2024, Google Threat Analysis Group (TAG) and Mandiant discovered “UNC5812,” a suspected hybrid Russian espionage and influence campaign that spreads Windows and Android malware via a Telegram persona named “Civil Defense.” “Civil Defense” claims to be a provider of free software programs that allow prospective draftees to view and share the locations of Ukrainian military recruiters. When installed with Google Play Protect disabled, these programs deliver an operating system-specific commodity malware variant to the victim along with a mapping application we identify as SUNSPINNER. The actors behind UNC5812 leverage both the…

Read more

Telegram: 361 million user data leaked
Eset_News

Cyber ​​criminals have published millions of email addresses as well as usernames and passwords for online accounts in channels of the messenger service Telegram, according to the operator of the site "Have-I-been-pwnd". According to a recent blog post by Troy Hunt, unknown persons have published over 122 gigabytes of data in channels of the messenger app Telegram. Troy Hunt is the operator of Have-I-been-pwned, a database for leaked access data. This includes: 361 million email addresses, almost half of which have apparently never appeared in such a data leak before. Usernames and passwords for online accounts were also part of the leak....

Read more

Signal and Telegram users: spy on fake apps from China 
Signal and Telegram users: Spying on fake apps from China - Image by Gerd Altmann on Pixabay

Chinese hackers are accessing personal user data using fake messenger apps. This includes message content, contact details and call logs. Particularly perfidious: The two bugs disguised as legitimate apps were available via the official app stores Google Play and Samsung Galaxy Store. The applications are still available from the Korean manufacturer. By May 2023, the hackers targeted thousands of users around the world. A main target is Germany. The team led by ESET researcher Lukas Stefanko has discovered the two apps “Signal Plus Messenger” and “FlyGram”, which prove to be legitimate signal...

Read more

Dangerous Telegram clone
B2B Cyber ​​Security ShortNews

Modified versions of mobile applications are very common in the world of apps. These applications may offer additional features and customizations, reduced prices, or be available in a larger number of countries than the original application. Their offer can be so tempting that careless users install them via unofficial external application stores. The risk of installing modified versions is that the user cannot know what changes have actually been made to the application code. More specifically, it is not known what code was added and whether it has malicious intent. The check point…

Read more

Cybergangsters: Telegram bots bypass ChatGPT restrictions
B2B Cyber ​​Security ShortNews

Check Point Research (CPR) security researchers found that cyber criminals use Telegram bots to bypass ChatGPT restrictions on underground forums. The bots use OpenAI's API to create malicious emails or code. Chat bot makers currently give up to 20 free queries, but then charge $5,50 for every 100 queries. CPR therefore warns of ongoing efforts by cybercriminals to circumvent ChatGPT's restrictions in order to use OpenAI for malicious purposes. Telegram ChatGPT Bot-as-a-Service CPR found advertisements for Telegram bots on underground forums. The bots use the API…

Read more

Raccoon-Stealer also uses Telegram for crypto mining
SophosNews

Sophos report: Widespread Raccoon stealer also uses Telegram for crypto mining and crypto theft. For the first time, the chat service Telegram has also been used for command and control communication. Sophos has published the new study "Trash Panda as a Service: Raccoon Stealer Steals Cookies, Cryptocoins and More". The subject is a stealer that steals cryptocurrencies and information disguised as a pirated copy and at the same time injects malicious content such as cryptominers into the target systems. "Since a large part of daily and professional life today depends on web-based services, cybercriminals are increasingly targeting stored web access data with their malware, as this gives them access to much more...

Read more

WhatsApp worm variant for Signal, Telegram and Skype
Eset_News

WhatsApp worm now also attacks via Signal, Telegram or Skype users. Malware has evolved and is now also using other messenger apps to spread. Messenger service users currently have to be careful. At the end of January, we published a security warning about a WhatsApp worm that spreads via supposed profit notifications. Further development of the malicious app The criminals have since developed the malicious app significantly. In its latest version, the malware also spreads through other messenger services such as Signal, Telegram, Skype and Viber. In the message sent by infected contacts, the malicious app promises after clicking on the link ...

Read more