Fraudsters Using Telegram API to Harvest Credentials : vimar

Fraudsters Using Telegram API to Harvest Credentials


Credentials are posted to the Telegram API and the user is redirected. (Source: Cofense)
A recently discovered phishing campaign attempted to steal victims' credentials by abusing the Telegram messaging app's API to create malicious domains that help bypass security tools such as secure email gateways, according to researchers at security firm Cofense.
This particular phishing attack appeared active in mid-December 2020 and has since stopped. The targets of these malicious emails mainly worked in the U.K. financial services sector, Cofense notes.
While the Telegram application offers secure, encrypted communication channels for its users, the Cofense report notes that the service also offers API options that can allow users to create programs that use the app's messages for an interface. In this case, the fraudsters used the APIs to create realistic-looking phishing domains that bypassed security tools.

Related Keywords

Jake Longden , , Application Security , Harvest Credentials , Live Webinar , Top Protection , All Pending Messages , Release All , Fraudsters Use Telegram App , Steal Payment Card Data , Juniper Threat Labs , Phishing Campaign , Telegram , Credentials , Seg , Tapi , விண்ணப்பம் பாதுகாப்பு , அறுவடை சான்றுகளை , வாழ வெபினார் , மேல் ப்ரொடெக்ஶந் , அனைத்தும் நிலுவையில் உள்ளது செய்திகள் , வெளியீடு அனைத்தும் , திருட கட்டணம் அட்டை தகவல்கள் , ஜூனிபர் அச்சுறுத்தல் ஆய்வகங்கள் , தந்தி , சான்றுகளை , செக் , அபி ,

© 2025 Vimarsana