Malware & RansomwareHIGH

Malware - Fake Telegram Site Distributes Multi-Stage Loader

CSCyber Security News·Reporting by Tushar Subhra Dutta
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, a fake Telegram site tricks users into downloading dangerous software.

Quick Summary

A fake Telegram download site is spreading malware disguised as a legitimate installer. Users risk severe system compromises through simple URL typos. Stay vigilant and only download from verified sources.

What Happened

A new threat has emerged from a typosquatted website designed to look like the official Telegram download page. The site, hosted at telegrgam[.]com, masquerades as a legitimate portal, prompting users to download a Windows installer named tsetup-x64.6.exe. This installer is not what it seems; it is a malicious file that initiates a multi-stage loading process, allowing attackers to execute harmful code without detection.

The malware operates by modifying system settings and running commands in the background. It avoids traditional detection methods by executing its final payload directly in the system's memory, never writing it to disk. This stealthy approach makes it particularly dangerous, as many antivirus programs rely on scanning files stored on the disk to identify threats.

Who's Being Targeted

This campaign primarily targets everyday users who may not pay close attention to the URLs they visit. The attackers exploit the popularity of Telegram, a widely used messaging app, to lure victims into downloading the fake installer. By creating similar domain names, such as www.telefgram[.]com and www.tejlegram[.]com, they increase their chances of catching unsuspecting users who mistype the URL.

The risk is significant; a single mistake can lead to a full system compromise. Users searching for a popular app can easily fall victim to this visual deception, which is a reminder of how cybercriminals exploit human error rather than relying solely on technical vulnerabilities.

Signs of Infection

Once the malicious installer is executed, it begins by checking for existing infections and disabling real-time protection in Windows Defender. This is done through an obfuscated PowerShell command that excludes all drive partitions from scanning. The installer then drops several files into a location designed to mimic legitimate software folders, further obscuring its presence.

The core of the attack lies in how the malware executes its payload. It uses a technique called reflective loading, where the malicious code is reconstructed in memory and executed without ever being saved to disk. This makes it extremely difficult for traditional security tools to detect the threat, allowing it to operate undetected while maintaining a connection to a command-and-control server.

How to Protect Yourself

To defend against such threats, users should only download software from official and verified sources. Always double-check the URL before downloading any files. Keeping endpoint security tools updated and monitoring network traffic for unusual outbound connections are also effective strategies to detect and mitigate these types of threats.

In addition, users should be cautious about any unexpected prompts or changes in their system after installing software. By staying vigilant and informed, individuals can better protect themselves from these sophisticated malware attacks.

🔒 Pro insight: The use of in-memory execution techniques highlights the need for advanced detection capabilities in endpoint security solutions.

Original article from

CSCyber Security News· Tushar Subhra Dutta
Read Full Article

Related Pings

HIGHMalware & Ransomware

Malware Newsletter Round 91 - Latest Threats and Insights

The latest malware newsletter reveals new threats like Infiniti Stealer and npm supply chain attacks. Developers and organizations must stay alert to evolving risks in cybersecurity.

Security Affairs·
HIGHMalware & Ransomware

Malicious Email Delivers CMD Malware - Privilege Escalation Alert

A malicious email has delivered a .cmd malware file that escalates privileges and bypasses antivirus systems. Users are at risk of significant system compromise. Awareness and immediate action are vital to mitigate this threat.

Security Affairs·
HIGHMalware & Ransomware

Axios NPM Package Compromised - Supply Chain Attack Exposed

A major supply chain attack compromised the Axios NPM package, affecting millions of users. Malicious versions deployed a RAT, posing serious security risks. Swift action was taken to remove the threats.

Trend Micro Research·
HIGHMalware & Ransomware

Brokk Hacked - Play Ransomware Exposes Sensitive Data

Brokk has reportedly been hacked by Play ransomware, leading to the leak of sensitive corporate data. This incident could severely impact the company's reputation and security. Organizations must bolster their defenses to prevent similar breaches.

SC Media·
HIGHMalware & Ransomware

Chaos Malware - New Targeting of 64-bit Linux Servers

Chaos malware has evolved to target 64-bit Linux servers, expanding its attack surface. This shift raises alarms for organizations relying on these systems. Enhanced security measures are now crucial to protect against potential larger-scale attacks.

SC Media·
HIGHMalware & Ransomware

Phorpiex Botnet - Spreading Ransomware and Sextortion Tactics

The notorious Phorpiex botnet is back, spreading ransomware and sextortion schemes. Millions are at risk as it targets users globally. Stay alert and protect your devices from this evolving threat.

Cyber Security News·