Hackers are unpredictable and they could come up with millions of ways to attack anything. This time attackers have compromised a non-profit cloud-based instant messaging service Telegram. According to Kaspersky Lab researchers, cyber-criminals have been able to exploit a vulnerability in Telegram to spread cryptocurrency miner to earn cryptocurrencies such as Monero and ZCash. The Telegram “zero day” flaw was used to distribute multipurpose malware, which depending on the device can be used either as a backdoor or as a tool to deliver mining software. First things first, let’s take a look at what is zero day vulnerability.
What is zero day vulnerability?
It is an attack that takes advantage of a security flaw on the same day that the vulnerability becomes generally known. In short, a zero-day attack happens once the vulnerability of software/hardware is exploited and attackers release malware before a coder has an opportunity to patch to fix the vulnerability. It can create problems well before anyone realizes something is wrong.
Telegram is one of the most popular end to end encrypted app used by cryptocurrency enthusiasts.
How Telegram vulnerability works?
- After that, they renamed this evil.js file as photo_high_re*U+202E*gnp.js.
- Now, as mentioned earlier, this *U+202E* is the right-to-left override unicode method which they used to make Telegram display the remaining string of the file gnp.js in reverse. It means, “gnp” is now displayed in reverse i.e. “png”.
- So, the name of the file is now “photo_high_resj.png” file. After completing this, attackers didn’t change the actual file extension .js.
- After that they sent the message to the recipient and recipient saw it as an incoming image file.
How to protect your PC from any such infection?
- Users should not download and click unknown files from untrusted sources
- Do not share any personal, confidential information in instant messengers
- Install reliable anti-virus.
Shiba Inu to Reach 1$ soon? This New Upcoming Development Proves it Right
Bitcoin Investor Sues AT&T
Trustwave Discovers Cryptojacking Malware On Make-A-Wish Foundation website
Shiba Inu Price Prediction: How High can SHIB Price reach by 2030?
Edward Snowden Likes Zcash
XMR Secrets – How Anonymous is Monero?
CoinTicker Crypto Tracking App Installs Backdoors On Mac Computers
SHIB’s Burn Rate Soars: Can it Ignite a Price Rally in 2023?
Q2 2018 Sees an 85% Increase in Crypto Malware Attacks
Crypto Malware found in Adobe Flash Player Updates
Cryptojacking In The Real World
How To Protect Your Cryptocurrency Against Hackers?
A Major Bug In Bitcoin Core Could Have Crashed the Whole Network
Big News: Ripple Price is about to TRIPLE? This News Confirms…
A Guide to Crypto Hacking: How to stay safe
bZx Protocol Wasn’t Compromised, Team Reports Zero Losses
North Korea Hacks Crypto Exchange With First-Ever macOS Malware
You might also like
More from Crypto
Public Warning: Unmasking Upland Metaverse Game Scheme in the Crashing Crypto Market
Want to know more about Upland's money scheme and fake community building? This article aims to shed light on these …
Will Cardano reach 0$ as the SEC Labels it a Security?
The SEC considers Cardano to be a security. Will Cardano reach 0$ as the SEC labels it as such? What …
Best Countries to Register Crypto Companies in 2023
In the rapidly evolving digital financial world, finding the right place to establish a cryptocurrency business can be challenging. This …