Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Why cybercrooks love Telegram Messenger

admin by admin
Feb 1, 2023
in Hacktivism
A A
0

Breadcrumb Trail Links

  1. Innovation
 

Article content

The Telegram text and video messaging service has become a “thriving ecosystem” for cybercrime and will likely continue to be a major challenge for security researchers and law enforcement, says a new report.

Advertisement 2

This advertisement has not loaded yet, but your article continues below.

Regina Leader Post NewsConnect Powered by Postmedia Network

REGISTER TO UNLOCK MORE ARTICLES

Create an account or sign in to continue with your reading experience.

  • Access articles from across Canada with one account
  • Share your thoughts and join the conversation in the comments
  • Enjoy additional articles per month
  • Get email updates from your favourite authors

Article content

It is largely used by individuals for legitimate messaging and purchases — including digital equipment, consumer loans, apparel and shoes –who appreciate that it’s free and supposedly encrypted.

Regina Leader Post Headline News Banner

Regina Leader Post Headline News

Sign up to receive daily headline news from Regina Leader-Post, a division of Postmedia Network Inc.

By clicking on the sign up button you consent to receive the above newsletter from Postmedia Network Inc. You may unsubscribe any time by clicking on the unsubscribe link at the bottom of our emails or any newsletter. Postmedia Network Inc. | 365 Bloor Street East, Toronto, Ontario, M4W 3L4 | 416-383-2300

Thanks for signing up!

A welcome email is on its way. If you don’t see it, please check your junk folder.

The next issue of Regina Leader Post Headline News will soon be in your inbox.

We encountered an issue signing you up. Please try again

Article content

But researchers at Israel-based Kela say in a report released Wednesday that Telegram Messenger is also a hub for cybercrime activities, including the sale and leakage of stolen personal and corporate data, the organization of cybercrime gangs, the distribution of hacking tutorials, hacktivism and the sale of illegal physical products such as counterfeits and drugs.

Among the groups using the platform are

— the Lapsus$ data extortion gang. As of December 2022, it had over 55,800 subscribers. However the group has been quiet since March, 2022, when several alleged members were arrested in England;

Advertisement 3

This advertisement has not loaded yet, but your article continues below.

Article content

— the pro-Russian Killnet group. Its main Telegram channel is followed by more than 90,000 users, says the report, and its campaigns are joined by many other influential hacking groups, including XakNet and NoName057;

— the Eternity Project, a malware-as-a-service operation, which uses Telegram bots to sell stolen information to actors who bought access to the service and to provide them with
an opportunity to build the binary. The stealer doesn’t have an administrator panel to manage the malware and attacks — everything is done via Telegram;

— “CHECKS GRUB SHOP” is a popular group for selling credit card information, counterfeit and stolen valid cheques, packages of full personal identification of individuals (known as  fullz) and stolen bank logs;

Advertisement 4

This advertisement has not loaded yet, but your article continues below.

Article content

Messaging services including Discord, Jabber, Tox and Wickr are also used by some cybercrooks, but many favour Telegram.

“One reason why Telegram is attractive to cybercriminals is its alleged built-in encryption
and the ability to create channels and large, private groups,” says the report. “These features make it difficult for law enforcement and security researchers to monitor and track criminal activity on the platform.

“In addition, cybercriminals often use coded language and alternative spellings to communicate on Telegram, making it even more challenging to decipher their conversations.”

The reason Kela is skeptical about the encryption is the company doesn’t disclose the code of the application so there’s no way to know how secure it is.

Advertisement 5

This advertisement has not loaded yet, but your article continues below.

Article content

As of November, 2022 there were an estimated 700 million monthly active users on the platform.

Telegram allows users to register accounts without disclosing personal information, the report notes, making it simple to set up many identities and use them to converse without revealing one’s genuine identity. “Because of this anonymity, law enforcement organizations have a tough time tracking down and identifying individuals who are using the program for illicit activities,” says the report.

While Telegram’s privacy policy states that it may disclose a user’s IP address and phone
number to authorities if presented with a court order on terrorism-related charges, the
company claims it hasn’t done so yet. However, the report says, recent investigations in Germany have revealed that the platform is sharing user data with government agencies and censoring content, despite its promise to keep users’ data secure and private.

Advertisement 6

This advertisement has not loaded yet, but your article continues below.

Article content

Kela recommends infosec teams

— use threat intelligence monitoring solutions to continuously monitor for potential
threats on Telegram and take proactive measures to prevent them;
— regularly train and educate employees on how to identify and respond to cyber
threats on Telegram;
— implement technical controls, such as firewalls and intrusion prevention systems,
to prevent cybercriminals from accessing sensitive data;
— increase collaboration and information sharing with law enforcement agencies and
other organizations to improve the ability to detect and disrupt cybercrime on the
platform;
— and conduct regular audits and assessments to identify any vulnerabilities or areas
for improvement in the organization’s defenses against cyber threats on Telegram.

The post Why cybercrooks love Telegram Messenger first appeared on IT World Canada.

This section is powered by IT World Canada. ITWC covers the enterprise IT spectrum, providing news and information for IT professionals aiming to succeed in the Canadian market.

Share this article in your social network

Advertisement 1

This advertisement has not loaded yet, but your article continues below.

Comments

Postmedia is committed to maintaining a lively but civil forum for discussion and encourage all readers to share their views on our articles. Comments may take up to an hour for moderation before appearing on the site. We ask you to keep your comments relevant and respectful. We have enabled email notifications—you will now receive an email if you receive a reply to your comment, there is an update to a comment thread you follow or if a user you follow comments. Visit our Community Guidelines for more information and details on how to adjust your email settings.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.