top of page

Warning: Fake Telegram Distributes Multi-Stage Malware Running Directly in RAM

  • Mar 20
  • 2 min read

A new cyberattack campaign is raising concerns among security experts, as attackers exploit Telegram to distribute sophisticated malware. The most alarming aspect is the use of “fileless malware” – malicious code that executes directly in memory (RAM), making detection significantly more difficult than traditional threats.


Fake Telegram distributing malware
Fake Telegram distributing malware - Source: Whitehat

Fake Telegram Used as a Malware Delivery Vector

According to reports, attackers are distributing fake Telegram versions or malicious download links disguised as legitimate applications to trick users. Once installed, the malware infects the system silently without obvious signs.

While this tactic is not entirely new, it has resurfaced with increased sophistication. Previous campaigns have also leveraged modified Telegram installers to deploy malware and gain control over user devices.

Multi-Stage Malware Operating in Memory

Unlike conventional malware that resides on disk, this variant uses a multi-stage attack approach:

  • Stage 1: Initial payload delivery and execution

  • Stage 2: Decryption and deployment of advanced payloads

  • Stage 3: Execution directly in RAM

By operating entirely in memory, the malware can:

  • Evade traditional antivirus detection

  • Leave minimal forensic traces

  • Maintain long-term persistence within infected systems

This reflects a growing trend in modern advanced persistent threat (APT) campaigns.


Malware Infection Process
Malware Infection Process (According to K7 Security Labs)

Telegram Increasingly Exploited by Cybercriminals

Telegram has long been abused by cybercriminal groups as a platform to:

  • Distribute malware

  • Control botnets

  • Share hacking tools

Security research indicates that Telegram hosts a vast underground ecosystem where malicious content is actively exchanged. Additionally, certain platform mechanisms have been exploited in the past to collect user data through simple interactions such as clicking a link.


Evading Microsoft Defender
Evading Microsoft Defender (Source: K7 Security Labs)

Risks for Individuals and Businesses

This campaign poses serious risks, especially for:

  • Employees using Telegram for work-related communication

  • Users downloading software from unofficial sources

  • Organizations lacking behavioral monitoring solutions

Once compromised, attackers may:

  • Steal login credentials

  • Access sensitive internal data

  • Launch deeper attacks within enterprise systems

Security Recommendations

To mitigate risks, experts recommend:

  • Download Telegram only from official sources

  • Avoid opening suspicious links or files

  • Use advanced security solutions with behavior-based detection

  • Keep operating systems and applications updated

  • Implement SOC monitoring for enterprise environments

This fake Telegram campaign highlights a clear shift toward stealthier, harder-to-detect attack techniques. Both individuals and organizations must remain vigilant, especially when using widely adopted communication platforms like Telegram—now increasingly targeted by cybercriminal activities.

Comments

Couldn’t Load Comments
It looks like there was a technical problem. Try reconnecting or refreshing the page.
IPSIP logo transparent.png

IPSIP VIETNAM ONE MEMBER LIMITED LIABILITY COMPANY (IPSIP VIETNAM OMLLC)

Tax code: 0313859600

🏢 SH05.01, B4 Street, Saritown Area, An Khanh Ward, Ho Chi Minh City, Vietnam

  • Linkedin
  • Facebook
  • TikTok
  • Email liên hệ

Our Services

Sign up to receive in-depth cybersecurity documents and news from IPSIP Vietnam.

bottom of page