Fake Telegram Apps: New Android Malware Threatens User Security

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025 2 min read

Fake Telegram Apps Malware Campaign

A significant malware campaign has emerged, targeting Android users through fake Telegram applications. Researchers have identified 607 different domains distributing these malicious apps, posing serious threats to user security and privacy. The fraudulent applications are designed to mimic the legitimate Telegram app, tricking users into downloading them. Once installed, these apps can compromise personal data, steal sensitive information, and even take control of the device. Users are advised to download apps only from official sources like the Google Play Store, and to be cautious of applications that request excessive permissions or appear suspicious. For more detailed insights, refer to the report here.

FireScam Android Malware

An Android malware named FireScam has been found posing as a premium version of the Telegram app to steal data and maintain remote control over compromised devices. The malware is distributed through a GitHub.io-hosted phishing site that impersonates RuStore, a popular app store in Russia. The dropper APK file, named "GetAppsRu.apk," initiates extensive surveillance activities once installed.

The malicious app requests various permissions, including access to external storage and the ability to install, update, or delete apps. It employs advanced evasion techniques and can monitor notifications, clipboard data, SMS messages, and more. Additionally, it registers for Firebase Cloud Messaging (FCM) notifications, allowing it to receive remote commands for covert access.

For more detailed information, visit The Hacker News.

Android phone malware

Cybersecurity Recommendations

To mitigate risks associated with this type of malware, users are encouraged to follow best practices in app security. This includes downloading applications solely from official app stores, regularly updating software, and avoiding any suspicious links or files from untrusted sources. Google spokespersons have confirmed that no apps containing this malware are found on Google Play, and the platform offers protection against known malware through Google Play Protect.

For further details on cybersecurity practices, refer to resources like TechRadar and Google Play Protect.

Overall Cybersecurity Landscape

The evolving cybersecurity landscape requires constant vigilance. Organizations and users alike must stay informed about potential threats and adopt proactive measures. For ongoing updates, follow platforms like Hackread and The Hacker News that provide real-time insights into the latest cybersecurity developments.

For comprehensive cybersecurity solutions, explore services offered by Gopher Security contact us for more information.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Tribal-ISAC

Tribal-ISAC Cybersecurity Report Highlights for Tribal Nations

Discover the vital findings from the Tribal-ISAC's inaugural cybersecurity report, empowering Tribal Nations to enhance their cyber resilience. Read more!

By Edward Zhou October 2, 2025 3 min read
Read full article
Stefanini Group

Stefanini Group Strengthens Cybersecurity with Key Acquisitions

Discover how Stefanini Group's merger with Cyber Smart Defence strengthens its cybersecurity division and enhances service offerings. Learn more!

By Edward Zhou October 2, 2025 3 min read
Read full article
cybersecurity

Cybersecurity Alert: 94% of Leaked Passwords Are Not Unique

Discover essential password habits and best practices to enhance your cybersecurity. Learn how to protect your accounts today!

By Edward Zhou October 2, 2025 3 min read
Read full article
cybersecurity

Cybersecurity Alert: 94% of Passwords Are Not Unique - Learn Why

Learn effective password habits to enhance your cybersecurity. Discover password management techniques to protect against online threats. Act now!

By Edward Zhou October 2, 2025 3 min read
Read full article