Fake Telegram Apps Laced with Malware Target Android Users Through Phishing Domains

by | Jul 16, 2025 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

607 Fake Telegram Domains Deliver Android Malware in Widespread Campaign

A Sophisticated Android Malware Operation

Researchers at BforeAI’s PreCrime Labs have uncovered a large-scale Android malware campaign involving 607 malicious domains designed to impersonate Telegram download pages. These sites are pushing fake Telegram APKs loaded with malware and abusing tactics like typosquatting, QR redirection, and SEO-optimized blog layouts.

The campaign is active as of July 2025 and aims to infect unsuspecting Android users with malware that mimics Telegram while silently granting the attacker broad system access.


Fake App, Real Threat

Victims are tricked into downloading a counterfeit version of Telegram via phishing emails, QR codes, or seemingly innocent blog-style websites. The fake APK files—sized 60MB and 70MB—look and behave like the real app, but in the background:

  • Request excessive permissions
  • Enable remote command execution
  • Leak sensitive data via unencrypted protocols (HTTP, FTP)

The phishing websites closely resemble Telegram branding with download buttons, icons, and titles like “Paper Plane Official Website Download” to lure users via search engines.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Malware Signed With Janus Vulnerability

The APKs are signed using the v1 Android signature scheme, making them vulnerable to the Janus vulnerability (CVE-2017-13156). This critical flaw allows malicious code to be injected into otherwise legitimate APKs without altering the signature, effectively bypassing signature-based security checks.

Once installed, the malware can:

  • Execute commands from a remote server
  • Abuse the MediaPlayer API for possible surveillance
  • Create persistent socket connections for live attacker control

This allows for file theft, activity monitoring, or launching secondary payloads.


Firebase Abuse and Infrastructure Insights

An older version of the malware connects to a Firebase endpoint at tmessages2[.]firebaseio[.]com, which has since been deactivated. However, researchers warn that this tactic could be recycled easily—anyone re-registering a Firebase project with the same name could reactivate infected clients silently.

Another technical component is a malicious tracking script (ajs.js) hosted on telegramt[.]net, which:

  • Collects device/browser fingerprint data
  • Sends it to attacker-controlled servers
  • Contains unused code to display Android-targeted download banners

 

Fake Telegram Apps Spread via 607 Domains in Large-Scale Android Malware CampaignThe page distributing the malicious Telegram APK mimics a blog layout and prompts users to install the app, which requests a set of permissions categorised by severity due to their potential misuse. (Image via BforeAI)




Domain Stats Reveal Strategic Choices

Out of the 607 domains:

  • .com: 316
  • .top: 87
  • .xyz: 59
  • .online: 31
  • .site: 24

This blend of trusted TLDs and cheap alternatives indicates a balance between credibility and cost-effective sprawl.

Most domains were registered through the Gname registrar and hosted in China, increasing the complexity of legal takedown efforts.


How Organizations Can Defend Themselves

BforeAI recommends several preventive measures:

  1. Automated domain monitoring to detect lookalikes early
  2. Multi-source threat scanning for APKs, hashes, and URLs
  3. Block APK or SVG file delivery if not required for business
  4. Train users to avoid downloading apps from unofficial sources—even if the page appears authentic

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: hackread.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This