Cybersecurity firm Kaspersky Lab has uncovered a vulnerability in the Telegram desktop app which allows the social messaging app to be exploited for mining cryptocurrencies.
In a statement, Kaspersky says the zero-day vulnerability provides a backdoor that “has been actively exploited since March 2017 for the cryptocurrency mining functionality.” It adds that they had notified Telegram of the vulnerability and “at the time of publication, the zero-day flaw has not since been observed in [the] messenger’s products.”
FPV Pocket Drone,Zantec RC Flexible Foldable Aerofoils Quadcopter Drone with FPV Camera and Live Video App and WiFi Phone Control UAV 6 Axis Gyroscope gravity RTF Helicopter (Remote Control and Battery, Red) …£34.15 – £37.60 Select options
POBD RC Drone Foldable Wifi FPV VR Quadcopter with 2MP HD Camera 2.4Ghz 6-Axis Gyro 4CH Remote Control Helicopter£64.88 – £72.88 Select options
Newest Syma X5C 2.4GHz 4CH RC Quadcopter + 2MP Camera + 3 Blade Propeller Gift + 2GB TF Card£30.39 – £34.42 Select options
JJRC H43WH Foldable Selfie Drone With Camera , G-Sensor Mode Micro Mini Drone , Remote Control Drone ( 720P HD camera , Wifi Function , Altitude Hold Mode ) for Kids Children Toy Video Drone by LITEBE£4.99 – £39.99 Select options
RC Quadcopter Drone,Mindkoo H36 Mini UFO Drone 2.4G 4CH 6 Axis Headless Mode Remote Control One Key Return Nano Quadcopter RTF Mode 2£16.29 Select options
Research conducted by Kaspersky showed that the zero-day flaw was based on the RLO (right-to-left override) Unicode method, which is generally used for coding languages written from right to left, such as Arabic and Hebrew. However, it can also be used by hackers to dupe unknowing recipients into downloading malware, for example disguised as images.
Kaspersky analysts identified “several scenarios of zero-day exploitation in the wild by threat actors.” The threats identified were two-fold. First, the exploit was used to deliver mining software, allowing hackers to use the victim’s machine to mine cryptocurrency including “Monero, Zcash, Fantomcoin and others.”
Second, a backdoor was installed allowing cybercriminals to gain remote access to the victim’s computer after which it started to “operate in a silent mode,” allowing “the threat actor to remain unnoticed in the network and execute different commands, including the further installation of spyware tools.”
Kaspersky says its analysis suggests the cybercriminals are of Russian origin, and the company has offered some tips to protect your PC against attack. These include not downloading and opening unknown files from untrusted sources, avoiding sharing sensitive personal information in messenger apps and making sure to have reliable antivirus software installed on your machine.