Fake Telegram Apps: New Android Malware Threatens User Security

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025 2 min read

Fake Telegram Apps Malware Campaign

A significant malware campaign has emerged, targeting Android users through fake Telegram applications. Researchers have identified 607 different domains distributing these malicious apps, posing serious threats to user security and privacy. The fraudulent applications are designed to mimic the legitimate Telegram app, tricking users into downloading them. Once installed, these apps can compromise personal data, steal sensitive information, and even take control of the device. Users are advised to download apps only from official sources like the Google Play Store, and to be cautious of applications that request excessive permissions or appear suspicious. For more detailed insights, refer to the report here.

FireScam Android Malware

An Android malware named FireScam has been found posing as a premium version of the Telegram app to steal data and maintain remote control over compromised devices. The malware is distributed through a GitHub.io-hosted phishing site that impersonates RuStore, a popular app store in Russia. The dropper APK file, named "GetAppsRu.apk," initiates extensive surveillance activities once installed.

The malicious app requests various permissions, including access to external storage and the ability to install, update, or delete apps. It employs advanced evasion techniques and can monitor notifications, clipboard data, SMS messages, and more. Additionally, it registers for Firebase Cloud Messaging (FCM) notifications, allowing it to receive remote commands for covert access.

For more detailed information, visit The Hacker News.

Android phone malware

Cybersecurity Recommendations

To mitigate risks associated with this type of malware, users are encouraged to follow best practices in app security. This includes downloading applications solely from official app stores, regularly updating software, and avoiding any suspicious links or files from untrusted sources. Google spokespersons have confirmed that no apps containing this malware are found on Google Play, and the platform offers protection against known malware through Google Play Protect.

For further details on cybersecurity practices, refer to resources like TechRadar and Google Play Protect.

Overall Cybersecurity Landscape

The evolving cybersecurity landscape requires constant vigilance. Organizations and users alike must stay informed about potential threats and adopt proactive measures. For ongoing updates, follow platforms like Hackread and The Hacker News that provide real-time insights into the latest cybersecurity developments.

For comprehensive cybersecurity solutions, explore services offered by Gopher Security contact us for more information.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article