Vulnerability in Telegram app for Android allows sending malicious files disguised as videos


ESET researchers discovered a zero-day exploit, which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from June 2024.

Example of how the EvilVideo exploit appears on Telegram (source: ESET)

Using the exploit to abuse a vulnerability that ESET named “EvilVideo,” attackers could share malicious Android payloads via Telegram channels, groups, and chats, and make them appear to be multimedia files.

“We found the exploit being advertised for sale on an underground forum. In the post, the seller shows screenshots and a video of testing the exploit in a public Telegram channel. We were able to identify the channel in question, with the exploit still available. That allowed us to get our hands on the payload and test it ourselves,” explains ESET researcher Lukáš Štefanko, who discovered the Telegram exploit.

Exploit works on Telegram versions 10.14.4 and older

ESET Research analysis of the exploit revealed that it works on Telegram versions 10.14.4 and older. The reason might be that the specific payload is most likely crafted using the Telegram API, since it allows developers to upload specially crafted multimedia files to Telegram chats or channels programmatically. The exploit seems to rely on the threat actor being able to create a payload that displays an Android app as a multimedia preview and not as a binary attachment. Once shared in chat, the malicious payload appears as a 30-second video.

By default, media files received via Telegram are set to download automatically. This means that users with this option enabled will automatically download the malicious payload once they open the conversation where it was shared. The default automatic download option can be disabled manually — in that case, the payload can still be downloaded by tapping the download button of the shared video.

If the user tries to play the “video,” Telegram displays a message that it is unable to play the video and suggests using an external player. However, if the user taps the Open button in the displayed message, they will be requested to install a malicious app disguised as the aforementioned external app.

After discovering the EvilVideo vulnerability on June 26, 2024, ESET followed coordinated disclosure policy and reported it to Telegram, but received no response at the time. They reported the vulnerability again on July 4, and that time, Telegram reached out to ESET the same day to confirm that its team was investigating EvilVideo. Telegam then fixed the issue, shipping version 10.14.5 on July 11. The vulnerability affected all versions of Telegram for Android up to 10.14.4, but has been updated as of version 10.14.5.



Source link