Navigation
Recherche
|
Telegram Zero-Day for Android Allowed Malicious Files To Masquerade as Videos
mardi 23 juillet 2024, 00:50 , par Slashdot
Researchers have identified a zero-day exploit for the Telegram messaging app on Android devices that could have allowed attackers to send malicious payloads disguised as legitimate files. From a report: The exploit was built to abuse a vulnerability that Slovakia-based firm ESET dubbed EvilVideo. Telegram fixed the bug earlier this month in versions 10.14.5 and above after researchers reported it. Threat actors had about five weeks to exploit the zero-day before it was patched, but it's not clear if it was used in the wild, ESET said. ESET discovered the exploit on an underground forum in early June. It was sold for an unspecified price by a user with the username 'Ancryno.' In its post, the seller showed screenshots and a video of testing the exploit in a public Telegram channel.
In unpatched versions of Telegram for Android, attackers could use the exploit to send malicious payloads via Telegram channels, groups and chats, making them appear as multimedia files. The exploit takes advantage of Telegram's default setting to automatically download media files. The option can be disabled manually, but in that case, the payload could still be installed on the device if a user tapped the download button in the top left corner of the shared file. If the user tried to play the 'video,' Telegram displayed a message that it was unable to play it and suggested using an external player. The hackers disguised a malicious app as this external player. Read more of this story at Slashdot.
https://yro.slashdot.org/story/24/07/22/1913238/telegram-zero-day-for-android-allowed-malicious-file...
Voir aussi |
56 sources (32 en français)
Date Actuelle
jeu. 21 nov. - 18:28 CET
|