Telegram zero-day allowed sending malicious Android APKs as videos

Teilen:

A Telegram for Android zero-day vulnerability dubbed ‘EvilVideo’ allowed attackers to send malicious Android APK payloads disguised as video files.

A threat actor named ‘Ancryno’ first began selling the Telegram zero-day exploit on June 6, 2024, in a post on the Russian-speaking XSS hacking forum, stating the flaw existed in Telegram v10.14.4 and older.

ESET researchers discovered the flaw after a PoC demonstration was shared on a public Telegram channel, allowing them to obtain the malicious payload.

ESET confirmed the exploit worked in Telegram v10.14.4 and older and named it ‘EvilVideo.’ ESET researcher Lukas Stefanko responsibly disclosed the flaw to Telegram on June 26 and again on July 4, 2024.

Telegram responded on July 4, stating they were investigating the report and then patched the vulnerability in version 10.14.5, released on July 11, 2024.

This means the threat actors had at least five weeks to exploit the zero-day before it was patched.

While it is unclear if the flaw was actively exploited in attacks, ESET shared a command and control server (C2) used by the payloads at ‘infinityhackscharan.ddns[.]net.’

BleepingComputer found two malicious APK files using that C2 on VirusTotal [1, 2] that pretend to be Avast Antivirus or an ‘xHamster Premium Mod.’

Telegram zero-day exploit

The EvilVideo zero-day flaw only worked on Telegram for Android and allowed attackers to create specially crafted APK files that, when sent to other users on Telegram, appear as embedded videos.

ESET believes that the exploit uses the Telegram API to programmatically create a message that appears to show a 30-second video.

On its default setting, the Telegram app on Android automatically downloads media files, so channel participants receive the payload on their device once they open the conversation.

For users who have disabled the auto-download, a single tap on the video preview is enough to initiate the file download.

When users attempt to play the fake video, Telegram suggests using an external player, which may cause recipients to tap the “Open” button and execute the payload.

Next, an additional step is required: the victim must enable the installation of unknown apps from the device settings, allowing the malicious APK file to install on the device.​

Though the threat actor claims the exploit is “one-click,” the fact that it requires multiple clicks, steps, and specific settings for a malicious payload to be executed on a victim’s device significantly reduces the risk of a successful attack.

ESET tested the exploit on Telegram’s web client and Telegram Desktop and found that it doesn’t work there because the payload is treated as an MP4 video file.

Telegram’s fix in version 10.14.5 now displays the APK file correctly in the preview, so recipients can no longer be deceived by what would appear as video files.

If you recently received video files that requested an external app to play via Telegram, perform a filesystem scan using a mobile security suite to locate and remove the payloads from your device.

Typically, Telegram video files are stored in ‘/storage/emulated/0/Telegram/Telegram Video/’ (internal storage) or in ‘/storage/<SD Card ID>/Telegram/Telegram Video/’ (external storage).

ESET shared a video demonstrating the Telegram zero-day exploit, which can be watched below.


A Telegram spokesperson sent BleepingComputer the following statement regarding the exploit:

This exploit is not a vulnerability in Telegram. It would have required users to open the video, adjust Android safety settings and then manually install a suspicious-looking “media app”.

We received a report about this exploit on July 5th and a server-side fix was deployed on July 9th to protect users on all versions of Telegram. – Telegram spokesperson

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
4:12 am, Juni 20, 2025
Wetter-Symbol 18°C
L: 16° | H: 18°
broken clouds
Luftfeuchtigkeit: 82 %
Druck: 1024 mb
Wind: 9 mph ENE
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 57%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:42 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
16° | 18°°C 0 mm 0% 11 mph 78 % 1024 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 32°°C 0.21 mm 21% 11 mph 62 % 1020 mb 0 mm/h
So. Juni 22 10:00 pm
Wetter-Symbol
18° | 26°°C 1 mm 100% 14 mph 82 % 1016 mb 0 mm/h
Mo. Juni 23 10:00 pm
Wetter-Symbol
15° | 25°°C 0.2 mm 20% 14 mph 75 % 1016 mb 0 mm/h
Di. Juni 24 10:00 pm
Wetter-Symbol
14° | 25°°C 0 mm 0% 15 mph 76 % 1017 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 7 mph 78 % 1024 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
22° | 24°°C 0 mm 0% 8 mph 57 % 1024 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 9 mph 33 % 1023 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 11 mph 34 % 1022 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
24° | 24°°C 0 mm 0% 10 mph 40 % 1021 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
20° | 20°°C 0 mm 0% 7 mph 56 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 5 mph 62 % 1020 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 5 mph 59 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€90,933.75
-0.30%
Ethereum(ETH)
€2,187.95
-0.13%
Fesseln(USDT)
€0.87
-0.01%
XRP(XRP)
€1.88
-0.06%
Solana(SOL)
€126.81
0.03%
USDC(USDC)
€0.87
-0.01%
Dogecoin(DOGE)
€0.147309
-0.61%
Shiba Inu(SHIB)
€0.000010
-0.59%
Pepe(PEPE)
€0.000009
-1.59%
Nach oben scrollen