CyberSecurity news
Mandvi@Cyber Security News
//
A critical zero-day vulnerability, dubbed EvilLoader, has been discovered in Telegram for Android by security researcher 0x6rss. This exploit allows attackers to disguise malicious APK files as video files, potentially leading to unauthorized malware installations on users' devices. The vulnerability exploits Telegram's file handling mechanism, tricking the app into treating HTML files with .mp4 extensions as legitimate video files, even though the file is not a video file.
When a user attempts to play these crafted "videos," Telegram prompts them to open the file in an external application, potentially leading to the installation of malicious software. For the attack to succeed, users must click the embedded link multiple times, disable Android’s security restriction on installing apps from unknown sources, and proceed with the installation. The file facilitating this attack has been available for sale on underground hacker forums.
ImgSrc: blogger.googleu
References :
- Cyber Security News: A critical zero-day vulnerability in Telegram for Android, dubbed EvilLoader, has been discovered by security researcher 0x6rss. This exploit allows attackers to disguise malicious APKs as video files, potentially leading to unauthorized malware installations on users’ devices.
- WeLiveSecurity: ESET researchers discuss how they uncovered a zero-day Telegram for Android exploit that allowed attackers to send malicious files posing as videos
- securityonline.info: Telegram’s EvilLoader: Hackers Exploit Video Flaw Again
Classification:
- HashTags: #Telegram #Android #Vulnerability
- Company: Telegram
- Target: Android users
- Attacker: 0x6rss
- Product: Telegram for Android
- Feature: EvilLoader
- Malware: EvilLoader
- Type: 0Day
- Severity: Major