November 6, 2024
Kaspersky Global Research and Analysis team (GReAT) has uncovered a malicious global campaign in which attackers used Telegram to deliver Trojan spyware, potentially targeting individuals and businesses in the fintech and trading industries. The malware is designed to steal sensitive data, such as passwords, and take control of users’ devices for espionage purposes.
The campaign is believed to be linked to DeathStalker, an infamous hack-for-hire APT (Advanced Persistent Threat) actor offering specialized hacking and financial intelligence services. In the recent wave of attacks observed by Kaspersky, threat actors attempted to infect victims with DarkMe malware – a remote access Trojan (RAT), designed to steal information and execute remote commands from a server controlled by the perpetrators.
Threat actors behind the campaign appear to have targeted victims in the trading and fintech sectors, as technical indicators suggest the malware was likely distributed via Telegram channels focused on these topics. The campaign was global, as Kaspersky has identified victims in more than 20 countries across Europe, Asia, Latin America, and the Middle East.
The infection chain analysis reveals the attackers were most likely attaching malicious archives to posts in Telegram channels. The archives themselves, such as RAR or ZIP files, were not malicious, but they contained harmful files with extensions like .LNK, .com, and .cmd. If potential victims launched these files, it leads to the installation of the final-stage malware, DarkMe, in a series of actions.
“Instead of using traditional phishing methods, threat actors relied on Telegram channels to deliver the malware. In earlier campaigns, we also observed this operation using other messaging platforms, such as Skype, as a vector for initial infection. This method may make potential victims more inclined to trust the sender and open the malicious file than in the case with a phishing website. Additionally, downloading files through messaging apps may trigger fewer security warnings compared to standard internet downloads, which is favourable for the threat actors,” explains Maher Yamout, Lead Security Researcher from GReAT. “While we typically advise vigilance against suspicious emails and links, this campaign highlights the need for caution when dealing even with instant messaging apps like Skype and Telegram.”
In addition to using Telegram for malware delivery, the attackers improved their operational security and post-compromise cleanup. After installation, the malware removed the files used to deploy the DarkMe implant. To further hinder analysis and try to evade detection, perpetrators increased the implant’s file size and deleted other footprints, such as post-exploitation files, tools, and registry keys, after achieving their goal.
About Kaspersky
Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection, specialized security products and services, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help over 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.