Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

Posted on October 25, 2025October 26, 2025 By CWS

A complicated backdoor named Android.Backdoor.Baohuo.1.origin has been found in maliciously modified variations of Telegram X messenger, granting attackers full management over victims’ accounts whereas working undetected.

The malware infiltrates units by way of misleading in-app commercials and third-party app shops, masquerading as legit courting and communication platforms.

With greater than 58,000 contaminated units unfold throughout roughly 3,000 smartphone fashions, tablets, TV containers, and even Android-based car programs, this menace represents a major escalation in cellular malware sophistication.

The backdoor’s distribution started in mid-2024, primarily focusing on Brazilian and Indonesian customers by way of Portuguese and Indonesian language templates.

Victims encounter commercials inside cellular functions that redirect them to counterfeit app catalogs that includes pretend opinions and promotional banners promoting “free video chats” and courting alternatives.

These fraudulent web sites ship trojanized APK recordsdata that seem indistinguishable from legit Telegram X installations.

One of many malicious websites from which the trojan model of Telegram X is downloaded (Supply – Dr.WEB)

Past malicious web sites, the backdoor has infiltrated established third-party app repositories together with APKPure, ApkSum, and AndroidP, the place it was deceptively posted underneath the official messenger developer’s identify regardless of having completely different digital signatures.

Dr.Net analysts recognized the malware’s distinctive functionality to steal confidential data together with login credentials, passwords, and full chat histories.

The backdoor conceals compromised account indicators by hiding third-party system connections from lively Telegram session lists.

Moreover, it autonomously provides or removes customers from channels, joins chats on behalf of victims, and disguises these actions totally, remodeling compromised accounts into instruments for artificially inflating Telegram channel subscribers.

What distinguishes Android.Backdoor.Baohuo.1.origin from typical Android threats is its unprecedented use of Redis database for command-and-control operations.

Earlier variations relied completely on conventional C2 servers, however malware authors progressively built-in Redis-based command reception whereas sustaining C2 server redundancy.

This represents the primary documented occasion of Redis database utilization in Android malware management mechanisms.

When initialized, the backdoor connects to its C2 server to retrieve configuration parameters together with Redis connection credentials, enabling menace actors to subject instructions and replace trojan settings remotely.

Superior Management Mechanisms and Information Exfiltration

The backdoor employs a number of strategies to control messenger performance with out detection.

For operations that don’t intrude with core app options, cybercriminals make the most of pre-prepared “mirrors” of messenger strategies—separate code blocks chargeable for particular duties inside Android program structure.

These mirrors facilitate displaying phishing messages inside home windows that completely replicate genuine Telegram X interfaces.

For non-standard operations requiring deeper integration, the malware leverages the Xposed framework to dynamically modify app strategies, enabling capabilities resembling hiding particular chats, concealing approved units, and intercepting clipboard contents.

By Redis channels and C2 servers, Android.Backdoor.Baohuo.1.origin receives intensive instructions together with importing SMS messages, contacts, and clipboard contents at any time when customers decrease or restore the messenger window.

This clipboard monitoring allows refined knowledge theft situations the place victims inadvertently expose cryptocurrency pockets passwords, mnemonic phrases, or confidential enterprise communications.

The backdoor systematically collects system data, put in software knowledge, message histories, and authentication tokens, transmitting this intelligence to attackers each three minutes whereas sustaining the looks of regular messenger operation.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Android, Control, Dangerous, Full, Gain, Hackers, Malware, Messenger, System, Telegram, Weaponizing

Post navigation

Previous Post: Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
Next Post: LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments

Related Posts

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials Cyber Security News
New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently Cyber Security News
Microsoft September 2025 Patch Tuesday Cyber Security News
Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads Cyber Security News
UK Retailer Co-op Confirms 6.5 Million Members’ Data Stolen in Massive Cyberattacks Cyber Security News
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
  • Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News