Phishing Kits and Campaigns: How Threat Actors are Exploiting Telegram

In recent months, cybersecurity researchers have discovered an alarming trend of threat actors using the popular messaging platform Telegram to peddle phishing kits and set up phishing campaigns. This new methodology of exploiting messaging apps is a worrying development and a reminder that cybercriminals are not just relying on traditional email phishing attacks to steal personal data.

Statistics

According to the Russian cybersecurity firm Kaspersky, over the past six months, it has detected more than 2.5 million malicious URLs generated using phishing kits. This number is incredibly high and highlights a significant increase in the number of phishing campaigns being conducted using Telegram.

Telegram bots

One of the most popular services offered by threat actors is the use of Telegram bots, which automate the process of generating phishing pages and collecting user data. These bots are sold on the dark web, and cybercriminals can buy them easily for a surprisingly low cost.

Personal data sharing

In some cases, phishers have even been observed sharing the personal data of users with other subscribers for free, in hopes of attracting aspiring criminals. This information can be used to carry out further attacks, making it an incredibly high-risk situation for individuals.

Paid services

Some of the more advanced phishing kits include features such as anti-bot detection, URL encryption, and geoblocking, making them even harder to detect. These kits are sold for anywhere between $10 and $280, highlighting the vast sums of money cybercriminals can make by conducting these types of attacks.

Sale of Personal Data

Another profitable business for cybercriminals is the sale of personal data, particularly bank account credentials. These details are advertised at different rates based on the balance of the account, highlighting the ruthless nature of these criminals.

Phishing-as-a-Service

Phishing services are now commonly marketed via Telegram on a subscription basis, known as phishing-as-a-service (PhaaS). Developers offer a monthly fee to rent the kits in return for providing regular updates, making it an incredibly cost-effective way of carrying out cyberattacks.

Low barrier to entry

“The threshold for joining the phisher community lowered once malicious actors migrated to Telegram and started sharing insights and knowledge, often for free, right there in the popular messaging service,” says Olga Svistunova, Kaspersky web content analyst. The ease with which these criminals can share information and their experiences with each other makes Telegram a breeding ground for these types of attacks.

Phishing attacks remain a significant problem in the cybersecurity world, and the use of messaging apps like Telegram only makes it easier for criminals to deploy their tactics. Individuals and organizations alike must be vigilant in protecting their personal information and adopt proper cybersecurity measures to prevent themselves from falling prey to these attacks. As we move forward, it is likely that we will see more creative and sophisticated approaches used by threat actors, highlighting the importance of staying up to date with the latest trends in cybersecurity.

Explore more

AI Redefines the Data Engineer’s Strategic Role

A self-driving vehicle misinterprets a stop sign, a diagnostic AI misses a critical tumor marker, a financial model approves a fraudulent transaction—these catastrophic failures often trace back not to a flawed algorithm, but to the silent, foundational layer of data it was built upon. In this high-stakes environment, the role of the data engineer has been irrevocably transformed. Once a

Generative AI Data Architecture – Review

The monumental migration of generative AI from the controlled confines of innovation labs into the unpredictable environment of core business operations has exposed a critical vulnerability within the modern enterprise. This review will explore the evolution of the data architectures that support it, its key components, performance requirements, and the impact it has had on business operations. The purpose of

Is Data Science Still the Sexiest Job of the 21st Century?

More than a decade after it was famously anointed by Harvard Business Review, the role of the data scientist has transitioned from a novel, almost mythical profession into a mature and deeply integrated corporate function. The initial allure, rooted in rarity and the promise of taming vast, untamed datasets, has given way to a more pragmatic reality where value is

Trend Analysis: Digital Marketing Agencies

The escalating complexity of the modern digital ecosystem has transformed what was once a manageable in-house function into a specialized discipline, compelling businesses to seek external expertise not merely for tactical execution but for strategic survival and growth. In this environment, selecting a marketing partner is one of the most critical decisions a company can make. The right agency acts

AI Will Reshape Wealth Management for a New Generation

The financial landscape is undergoing a seismic shift, driven by a convergence of forces that are fundamentally altering the very definition of wealth and the nature of advice. A decade marked by rapid technological advancement, unprecedented economic cycles, and the dawn of the largest intergenerational wealth transfer in history has set the stage for a transformative era in US wealth