Cybersecurity

Kaspersky uncovers a global Telegram malware campaign targeting fintech users

Hackers used Telegram to spread spyware targeting users and businesses in the fintech and trading industries

A targeted attack on the fintech sector

The Kaspersky research team has recently revealed a global malware campaign in which cybercriminals used Telegram to distribute spyware. This malware, a sophisticated Trojan, is designed to steal sensitive data such as passwords and take control of devices for espionage purposes, targeting both individuals and companies in the fintech and trading sectors.

Who’s behind the attack: the DeathStalker group

The campaign appears linked to DeathStalker, an Advanced Persistent Threat (APT) actor offering hack-for-hire and financial intelligence services. During the latest attack observed by Kaspersky, DeathStalker attempted to infect victims with DarkMe malware, a remote access Trojan (RAT) capable of stealing information and executing commands from a remote server.

Victims: Telegram users in trading and fintech channels

Hackers targeted Telegram channels frequented by enthusiasts and professionals in trading and fintech. This campaign spanned over 20 countries across Europe, Asia, Latin America, and the Middle East.

The infection process: DarkMe malware in action

The infection chain analysis revealed that attackers used malicious archives like RAR or ZIP, attaching them to Telegram posts. Within these archives, seemingly harmless files with extensions like .LNK, .com, and .cmd trigger the infection, leading to the installation of the DarkMe malware.

Telegram as a discreet attack vector

According to Maher Yamout, a Kaspersky expert, cybercriminals use Telegram channels to bypass security checks: “Using messaging platforms like Telegram builds trust, leading victims to download malware without security warnings, which are less frequent compared to standard internet downloads.”

DeathStalker’s hiding strategy

DeathStalker employs advanced techniques to hide traces: it deletes files and tools used during the attack and enlarges the malware size to evade detection, simulating activities of other APT groups.

Kaspersky’s security advice

To mitigate risks, Kaspersky recommends:

  • Installing trusted security solutions
  • Staying informed about new attack techniques
  • Providing full cyber threat visibility for InfoSec teams
  • Investing in advanced cybersecurity training

Sign up for the newsletter. Stay updated!

We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.

Dopstart

Dopstart è il sito di Paolino Donato ma anche il suo Nickname su Internet. Dopstart è un consulente SEO. Si occupa di posizionamento nei motori di ricerca fin dal 1998. Dal 2010 ha collaborato con Google in qualità di TC per Google News italiano e Google Noticias per i Paesi di Lingua spagnola e dal 2018 come Product Expert vedi curriculum

Share
Published by
Dopstart

Recent Posts

Instagram: new features for broadcast channels

Instagram introduces the option for creators to enable replies in broadcast channels, boosting engagement with…

3 weeks ago

Google Analytics integrates Customer Match to improve remarketing

A step towards more effective advertising campaigns thanks to the integration of first-party data. Customer…

3 weeks ago

Web banners: what are online advertisements?

What is a web banner and why is it important? A web banner is a…

4 weeks ago

Introduction to Web Design: guidelines

What is Web Design What is Web Design? It is the art of combining creativity,…

4 weeks ago

Elements and principles of design

What are the elements of design The fundamental elements of design (I call them "design…

4 weeks ago

Google explains why it’s hiding the results count in search

Why has Google hidden the results count? Google has recently chosen to make the results…

4 weeks ago