Telegram (AI) YouTube Facebook X
Ру
Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events

Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events

We have gathered the week’s most important cybersecurity news.

  • Users fell victim to espionage via a trojanised Telegram.
  • A fake Pokemon NFT game allowed hackers to take control of Windows devices.
  • Data of 200 million Twitter users was made public.
  • MetaMask warned of a new cryptocurrency scam.

Users fall victim to espionage by trojanised Telegram

ESET researchers uncovered a fake Shagle app, a trojanised version of the Telegram Android app with a backdoor added to its code.

The malware distribution is attributed to the hacker group StrongPity.

The legitimate Shagle platform provides random encrypted video chats, but it is web-first and has no dedicated mobile app. Since 2021, StrongPity has distributed malware masquerading as the official Shagle site.

Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events
Legitimate site on the left and the fake one on the right. Data: ESET.

After installation, the app allows hackers to monitor victims by recording calls, tracking device location, collecting SMS messages, call logs, contacts, and files. The collected data ultimately makes its way to the hackers’ command-and-control server.

The malware’s permissions enable it to read incoming notifications and messages from various apps, including Gmail, Kik, LINE, Facebook Messenger, Skype, Snapchat, Telegram, Tinder, Twitter, Viber and WeChat.

Additionally, on devices with full administrative privileges, the malware can automatically change security settings, write data to the filesystem, and reboot the phone.

ESET analysts suspect that links to the fake Shagle site were spread via phishing email campaigns, SMS phishing, or instant messages on online platforms.

The hackers’ site is currently inactive.

Fake Pokemon NFT game allowed hackers to gain control of Windows devices

Through a fake Pokemon card game site, attackers distribute the NetSupport remote access tool to gain control over victims’ devices. According to experts at ASEC.

According to the site, the strategy game is based on the Pokemon franchise and promises users extra earnings from NFT investments.

Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events
Data: ASEC.

Clicking the ‘Play on PC’ button downloads an executable that looks like a standard game installer but actually installs the NetSupport remote access tool on the victim’s system. Although NetSupport Manager is legitimate software, attackers typically use it in their malware campaigns.

It enables hackers to remotely connect to the infected device to steal data, install other malware, or attempt further propagation across the network.

The first signs of activity for this campaign appeared in December 2022. At the time of writing, the site was still accessible.

Data of 200 million Twitter users exposed online

Another Twitter user data leak was documented on the well-known Breached hacker forum. As reported by Bleeping Computer, the 59-GB dump contains information on 200 million profiles.

The hacker valued the database at $2.

In total, 211,524,284 unique email addresses were exposed. The dump also includes names, usernames, follower counts and account creation dates.

Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events
Data: Bleeping Computer.

Twitter representatives stated that user information was not obtained through the previously identified vulnerability in the API related to the Android client authentication process.

In December 2021, that vulnerability could be used to send phone numbers and email addresses to obtain a Twitter ID. The bug was fixed in January 2022.

«The aforementioned dataset of 200 million users cannot be correlated with the incident previously reported or any information obtained from exploiting Twitter systems», — said Twitter representatives.

Twitter stressed that the dump did not contain passwords or information that could lead to password compromises.

MetaMask warns of a new cryptocurrency scam

The non-custodial wallet MetaMask warned of a new scam called ‘Address Poisoning,’ which makes users send funds to the scammer instead of the intended recipient.

Hackers poison the transaction history and replace wallet addresses with ones that resemble those used in recent transfers.

Then the attacker sends a small amount of cryptocurrency to the victim’s address or even a zero-value transaction so it shows up in the wallet history. Because MetaMask shortens addresses in the transaction history, it creates the impression that this is the same person’s address.

The attacker then waits for the victim to use his address in a subsequent transfer.

There is no foolproof way to prevent this kind of fraud, so MetaMask warns users to be careful when copying addresses from transactions.

Darknet marketplaces shift to Android apps

From Q3 2022, drug-trafficking darknet marketplaces began using their own Android apps to increase privacy and avoid law enforcement attention, according to Resecurity.

According to them, at least seven trading platforms — Yakudza, TomFord24, 24Deluxe, PNTS32, Flakka24, 24Cana and MapSTGK — released APK files of their own Android apps.

Trojanised Telegram, a fake Pokemon NFT game and other cybersecurity events
Data: Resecurity.

Experts suggested this was a response to last year’s law-enforcement actions, notably the closure of Hydra marketplace.

Mobile apps allow transmitting data about drug orders and sending the courier’s geographic coordinates of the stash. Information sharing across apps creates fragmentation and hampers law enforcement from tracking criminals.

Experts logged a breach affecting 3.5 million Mail.ru users

Data from one of Mail.ru’s services was made public. The Telegram channel “Info Leaks” reports on this.

The published database includes more than 3.5 million rows, including:

  • nickname, first name, last name and user ID;
  • email address on mail.ru domains, corp.mail.ru, bk.ru, inbox.ru and list.ru;
  • mobile phone number.

In total, 1,647,711 unique phone numbers are in the database. A random check via the account.mail.ru password-recovery form confirmed that the leaked entries belong to real users.

Mail.ru said that users are not under threat and that the service is “secure.”

«The published data relate to a leak from a third-party resource in early 2022», — according to the company’s press service.

The company is investigating the incident.

Also on ForkLog:

What to read this weekend?

Read about DeFi hacks and scams in 2022 in ForkLog’s end‑of‑year piece.

Follow ForkLog’s bitcoin news in our Telegram — cryptocurrency news, prices and analysis.

Подписывайтесь на ForkLog в социальных сетях

Telegram (основной канал) Facebook X
Нашли ошибку в тексте? Выделите ее и нажмите CTRL+ENTER

Рассылки ForkLog: держите руку на пульсе биткоин-индустрии!

We use cookies to improve the quality of our service.

By using this website, you agree to the Privacy policy.

OK