Telegram Is Where Cyber Criminals Do Business

Telegram is a free and open-source platform that offers cloud-based instant messaging to its users  and the service is justifiably popular for its end-to-end encrypted chats, file sharing, and video calling feature. In other words, Telegram is a WhatsApp alternative.

Now research shows that a growing network of criminals are using Telegram to share data leaks on the platform. In fact, it looks like Telegram has become a major a hub for cyber criminals looking to buy, sell and share stolen data and hacking tools, as the messaging app emerges as an alternative to the Dark Web.

The Financial Times reports that this increase in cyber criminal activities on Telegram has increase since angry WhatsApp users switched to Telegram to have the same benefits of instant messaging with extra security and privacy. What seems to have cause the use of Telegram is that recently WhatsApp announced an update in its policy and terms of service, literally forcing users to accept their new terms and conditions wherein it would share data with its parent company, Facebook. 

Privacy activists and consumers were outraged by WhatsApp’s revised policy, so much so, that they decided to switch from WhatsApp entirely and move to secure alternatives like Telegram and Signal.

An investigation by cyber intelligence group Cyberint, together with the Financial Times, found a ballooning network of hackers sharing data leaks on the popular messaging platform, sometimes in channels with tens of thousands of subscribers, lured by its ease of use and light-touch moderation.In many cases, the content resembled that of the marketplaces found on the dark web, a group of hidden websites that are popular among hackers and accessed using specific anonymising software.

Telegram has become a locale of choice for cyber criminals looking to buy or sell stolen user data and share hacking tools.

Cyber criminals have been lured to the encrypted messaging app from the dark web by Telegram’s lack of moderation and secure servers. On the platform stolen personal data is shared by hackers with tens of thousands of users Telegram has declined to comment, but has removed the “combolist” channel in response to claims that hundreds of thousands of leaked usernames and passwords were leaked via the chat room.

About Telegram 

Telegram was launched in 2013 by brothers Nikolia and Pavel Durov. Previously, the pair founded the Russian social network VK, which they left in 2014 after it was taken over by President Putin's allies. It is an online messaging app that works just like popular messaging apps WhatsApp and Facebook Messenger and this means that you can use it to send messages to your friends when connected to Wi-Fi or your mobile data. 

Telegram’s core functionality is the same as most other messaging apps: You can message other Telegram users, create group conversations, call contacts, make video calls, and send files and stickers. 

However, there are a few specific features that make it work differently from other chat apps.

  • What makes Telegram unique is its focus on privacy, encryption, and an open-source API. There are countless unofficial clients to go along with the official Telegram apps and web interface. It also allows multiple devices to use the same account (verified by SMS), and multiple accounts on the same device.
  • Telegram is cloud-based and claims that it prioritises security and speed, making it a good alternative to other popular messaging apps. 
  • Telegram provides end-to-end encrypted voice and video calls and optional end-to-end encrypted "secret" chats. Cloud chats and groups are encrypted between the app and the server, so that ISPs and other third-parties on the network can't access data, but the Telegram server can. 
  • Users can send text and voice messages, make voice and video calls, and share an unlimited number of images, documents (2 GB per file), user locations, animated stickers, contacts, and audio files.
  • Telegram passed 500 million monthly active users in January 2021 and was the most downloaded app worldwide in with 1 billion downloads globally by August.

In almost very way, Telegram is an ideal platform cyber criminals to do business with each other.

All its activities including chats, groups and media shared between participants, is encrypted. This means that they won’t be visible without being deciphered first. The app also lets you set self-destruct timers on messages and media that you share which can range from two seconds to one week through its built-in feature ‘Secret Chat’. The use end-to-end encryption, leaving no trace on Telegram’s servers.

Financial Times:    Ars Technica:    Slashdot:    City AM:     TechStory:    Voonze:    Android Authority:    Thales:

You Might Also Read: 

Police First Hack Then Demolish Organised Crime Gangs:

 

« How Do Netflix And Other OTT's Take Care Of Cyber Security?
Europol Breaks Open Mafia Cyber Crime Group »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.