‘TeleGrab’ malware again shows how hackers can evade encryption to read private messages

Researchers with Talos, Cisco’s cybersecurity division, have identified malware that allows a hacker to steal information from victims using the messaging service Telegram. Detailed in a Talos blog post published Wednesday, Talos says the TeleGrab malware targets Russian-speaking victims and is designed to hijack chat sessions and capture contacts and previous chats. It’s worth noting that the malware only affects Telegram’s desktop and browser client, which does not have the same security features as the mobile app. “The malware abuses the lack of Secret Chats which is a feature, not a bug,” the researchers write, referring to Telegram’s client-to-client encrypted chat feature. Telegram’s desktop clients don’t have the feature because they don’t support local storage, according to a Telegram FAQ page. For that reason, Talos says the malware does not exploit any vulnerability. “The problem is the lack of transparency, users are never warned that by using Telegram Desktop their […]

The post ‘TeleGrab’ malware again shows how hackers can evade encryption to read private messages appeared first on Cyberscoop.

Continue reading ‘TeleGrab’ malware again shows how hackers can evade encryption to read private messages