Fake Telegram Messenger apps hacking devices with lethal malware

IANSUpdated: Wednesday, January 05, 2022, 09:21 AM IST
article-image

New Delhi: Fake Telegram Messenger apps are currently hacking devices, including PCs, with a Windows-based malware that can put your information at risk as it evades the installed anti-virus systems, cyber-security researchers have warned.

According to a report by Minerva Labs, founded in 2014 by former officers of the Israeli Defence Forces who served in elite cyber forces, fake installers of the Telegram messaging application are being used to distribute the Windows-based 'Purple Fox' backdoor on compromised systems.

"We found a large number of malicious installers delivering the same 'Purple Fox' rootkit version using the same attack chain. It seems like some were delivered via email, while others we assume were downloaded from phishing websites," said researcher Natalie Zargarov.

"The beauty of this attack is that every stage is separated to a different file which is useless without the entire file set. This helps the attacker protect his files from AV (anti-virus) detection," the researcher informed.

During the investigation, they found that the threat actor was able to leave most parts of the attack under the radar by separating the attack into several small files, most of which had very low detection rates by (antivirus) engines, "with the final stage leading to Purple Fox rootkit infection".

First discovered in 2018, 'Purple Fox' comes with rootkit capabilities that allow the malware to be planted beyond the reach of anti-virus solutions, reports thehackernews.com.

In October 2021, Trend Micro researchers uncovered a .NET implant dubbed FoxSocket deployed in conjunction with Purple Fox. "The rootkit capabilities of Purple Fox make it more capable of carrying out its objectives in a stealthier manner," the researchers noted.

"They allow Purple Fox to persist on affected systems as well as deliver further payloads to affected systems." Zargarov said that they have often observed threat actors using legitimate software for dropping malicious files.

"This time, however, is different. This threat actor was able to leave most parts of the attack under the radar by separating the attack into several small files, most of which had very low detection rates by AV engines, with the final stage leading to Purple Fox rootkit infection, the researcher noted.

(To receive our E-paper on whatsapp daily, please click here. To receive it on Telegram, please click here. We permit sharing of the paper's PDF on WhatsApp and other social media platforms.)

RECENT STORIES

Daily Horoscope for Saturday, August 13, 2022, for all zodiac signs by astrologer Vinayak Vishwas...

Daily Horoscope for Saturday, August 13, 2022, for all zodiac signs by astrologer Vinayak Vishwas...

Meet Mukesh Chauhan, Rajasthan resident who tattooed names of 62 martyrs of different wars

Meet Mukesh Chauhan, Rajasthan resident who tattooed names of 62 martyrs of different wars

Mumbai: Western Railway achieves new milestone, as it earns over Rs 200 Crore through scrap sales

Mumbai: Western Railway achieves new milestone, as it earns over Rs 200 Crore through scrap sales

Cops likely to record Ranveer Singh's statement by August 22

Cops likely to record Ranveer Singh's statement by August 22

50 years old father of an illegal church held for molestation in Nerul

50 years old father of an illegal church held for molestation in Nerul