Cybersecurity

Kaspersky uncovers a global Telegram malware campaign targeting fintech users

Hackers used Telegram to spread spyware targeting users and businesses in the fintech and trading industries

A targeted attack on the fintech sector

The Kaspersky research team has recently revealed a global malware campaign in which cybercriminals used Telegram to distribute spyware. This malware, a sophisticated Trojan, is designed to steal sensitive data such as passwords and take control of devices for espionage purposes, targeting both individuals and companies in the fintech and trading sectors.

Who’s behind the attack: the DeathStalker group

The campaign appears linked to DeathStalker, an Advanced Persistent Threat (APT) actor offering hack-for-hire and financial intelligence services. During the latest attack observed by Kaspersky, DeathStalker attempted to infect victims with DarkMe malware, a remote access Trojan (RAT) capable of stealing information and executing commands from a remote server.

Victims: Telegram users in trading and fintech channels

Hackers targeted Telegram channels frequented by enthusiasts and professionals in trading and fintech. This campaign spanned over 20 countries across Europe, Asia, Latin America, and the Middle East.

The infection process: DarkMe malware in action

The infection chain analysis revealed that attackers used malicious archives like RAR or ZIP, attaching them to Telegram posts. Within these archives, seemingly harmless files with extensions like .LNK, .com, and .cmd trigger the infection, leading to the installation of the DarkMe malware.

Telegram as a discreet attack vector

According to Maher Yamout, a Kaspersky expert, cybercriminals use Telegram channels to bypass security checks: “Using messaging platforms like Telegram builds trust, leading victims to download malware without security warnings, which are less frequent compared to standard internet downloads.”

DeathStalker’s hiding strategy

DeathStalker employs advanced techniques to hide traces: it deletes files and tools used during the attack and enlarges the malware size to evade detection, simulating activities of other APT groups.

Kaspersky’s security advice

To mitigate risks, Kaspersky recommends:

  • Installing trusted security solutions
  • Staying informed about new attack techniques
  • Providing full cyber threat visibility for InfoSec teams
  • Investing in advanced cybersecurity training

Sign up for the newsletter. Stay updated!

We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.

Dopstart

Dopstart è il sito di Paolino Donato ma anche il suo Nickname su Internet. Dopstart è un consulente SEO. Si occupa di posizionamento nei motori di ricerca fin dal 1998. Dal 2010 ha collaborato con Google in qualità di TC per Google News italiano e Google Noticias per i Paesi di Lingua spagnola e dal 2018 come Product Expert vedi curriculum

Share
Published by
Dopstart

Recent Posts

Gmail scam alert: fake tech support trick is stealing your recovery codes

Phishing emails and fake Google calls are compromising accounts—here’s how the scam works and how…

6 days ago

APT41: when espionage becomes business

The Chinese hacker group turning every vulnerability into an attack opportunity In the vast ecosystem…

2 weeks ago

The file wp-config.php already exists? Clear Aruba cache

When WordPress works… but only on your computer You’ve just installed WordPress on a brand new domain.…

1 month ago

UI Design: cos’è e come si fa?

In this article, we’ll explore what User Interface Design (UI Design) is, why it’s crucial…

1 month ago

How ChatGPT is rewriting digital marketing rules

With generative AI on the rise, winning mentions is now the key to online brand…

1 month ago

Google revamps AdSense: auto optimization now customizable per site

The latest update from Mountain View gives publishers greater control over advertising experiments and a…

1 month ago