fbpx
Techitup Middle East
B2B TechnologyCybersecurity

ESET Research Discovers EvilVideo

EvilVideo allows attackers to send malicious payloads that appear as video files in the older Telegram app for Android

ESET researchers discovered a zero-day exploit, EvilVideo which targets the Telegram app for Android, that appeared for sale for an unspecified price in an underground forum post from June 2024. Using the exploit to abuse a vulnerability that ESET named “EvilVideo,” attackers could share malicious Android payloads via Telegram channels, groups, and chats, and make them appear to be multimedia files. 

ESET Research analysis of the exploit revealed that it works on Telegram versions 10.14.4 and older. The reason might be that the specific payload is most likely crafted using the Telegram API, since it allows developers to upload specially crafted multimedia files to Telegram chats or channels programmatically. The exploit seems to rely on the threat actor being able to create a payload https://techitupme.com/eset-research-stay-away-from-spyloan-apps/that displays an Android app as a multimedia preview and not as a binary attachment. Once shared in chat, the malicious payload appears as a 30-second video. 

By default, media files received via Telegram are set to download automatically. This means that users with this option enabled will automatically download the malicious payload once they open the conversation where it was shared. The default automatic download option can be disabled manually — in that case, the payload can still be downloaded by tapping the download button of the shared video. 

If the user tries to play the “video,” Telegram displays a message that it is unable to play the video and suggests using an external player. However, if the user taps the Open button in the displayed message, they will be requested to install a malicious app disguised as the aforementioned external app. 

After discovering the EvilVideo vulnerability on June 26, 2024, ESET followed coordinated disclosure policy and reported it to Telegram, but received no response at the time. We reported the vulnerability again on July 4, and that time, Telegram reached out to ESET the same day to confirm that its team was investigating EvilVideo. Telegram then fixed the issue, shipping version 10.14.5 on July 11. The vulnerability affected all versions of Telegram for Android up to 10.14.4, but has been updated as of version 10.14.5. 

For more information about EvilVideo, read the blogpost “Cursed tapes: Exploiting the EvilVideo vulnerability in Telegram for Android”. 

Related posts

NordicEPOD Secures Investment from Eaton and CTS Nordics

Editor

IFS.ai Adoption Rises with High Demand for Industry-specific AI

Editor

Cloudflare’s Project Galileo Turns 10

Editor

Leave a Comment