Cybersecurity

Kaspersky uncovers a global Telegram malware campaign targeting fintech users

Hackers used Telegram to spread spyware targeting users and businesses in the fintech and trading industries

A targeted attack on the fintech sector

The Kaspersky research team has recently revealed a global malware campaign in which cybercriminals used Telegram to distribute spyware. This malware, a sophisticated Trojan, is designed to steal sensitive data such as passwords and take control of devices for espionage purposes, targeting both individuals and companies in the fintech and trading sectors.

Who’s behind the attack: the DeathStalker group

The campaign appears linked to DeathStalker, an Advanced Persistent Threat (APT) actor offering hack-for-hire and financial intelligence services. During the latest attack observed by Kaspersky, DeathStalker attempted to infect victims with DarkMe malware, a remote access Trojan (RAT) capable of stealing information and executing commands from a remote server.

Victims: Telegram users in trading and fintech channels

Hackers targeted Telegram channels frequented by enthusiasts and professionals in trading and fintech. This campaign spanned over 20 countries across Europe, Asia, Latin America, and the Middle East.

The infection process: DarkMe malware in action

The infection chain analysis revealed that attackers used malicious archives like RAR or ZIP, attaching them to Telegram posts. Within these archives, seemingly harmless files with extensions like .LNK, .com, and .cmd trigger the infection, leading to the installation of the DarkMe malware.

Telegram as a discreet attack vector

According to Maher Yamout, a Kaspersky expert, cybercriminals use Telegram channels to bypass security checks: “Using messaging platforms like Telegram builds trust, leading victims to download malware without security warnings, which are less frequent compared to standard internet downloads.”

DeathStalker’s hiding strategy

DeathStalker employs advanced techniques to hide traces: it deletes files and tools used during the attack and enlarges the malware size to evade detection, simulating activities of other APT groups.

Kaspersky’s security advice

To mitigate risks, Kaspersky recommends:

  • Installing trusted security solutions
  • Staying informed about new attack techniques
  • Providing full cyber threat visibility for InfoSec teams
  • Investing in advanced cybersecurity training

Sign up for the newsletter. Stay updated!

We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.

Dopstart

Dopstart è il sito di Paolino Donato ma anche il suo Nickname su Internet. Dopstart è un consulente SEO. Si occupa di posizionamento nei motori di ricerca fin dal 1998. Dal 2010 ha collaborato con Google in qualità di TC per Google News italiano e Google Noticias per i Paesi di Lingua spagnola e dal 2018 come Product Expert vedi curriculum

Share
Published by
Dopstart

Recent Posts

Consulente SEO, cosa fa e perché ti servo io?

Perché un consulente SEO è indispensabile per il tuo business e perchè io? In questo…

26 minutes ago

NIS2 Directive : The Italian National Cybersecurity Strategy

The Italian National Cybersecurity Strategy 2022-2026 represents a fundamental pillar to strengthen the digital protection…

3 days ago

New Google core update November 24

The November 2024 update brings new challenges for content creators. Here are some tips for…

1 week ago

AI tools and Apps for students

From language learning to writing, AI offers useful tools to improve study effectiveness Artificial Intelligence:…

2 weeks ago

Search Engine Marketing: definition and characteristics

The world of marketing is constantly evolving, and with the advent of digital technology, Search Engine…

2 weeks ago

Microsoft offers $1 Million to those who choose Bing over Google

Switch to Bing and win up to $1 million! Microsoft launches an initiative to encourage…

2 weeks ago