ESET Analysis
ESET researchers discovered a zero-day vulnerability in Telegram for Android that enabled attackers to disseminate malware disguised as movie files.

With nearly a billion monthly users, Telegram poses an enticing target for hackers seeking to exploit a zero-day vulnerability and unleash malware. A ESET malware researcher stumbled upon a novel exploit, dubbed by the cybersecurity firm, while browsing an online underworld marketplace. They delved deeper to uncover its details and subsequently reported their findings.
During the podcast conversation with host ESET Distinguished Researcher, Štefanko shares the results of his assessment, noting a crucial detail: the vulnerability exclusively impacted the Android version of the app, leaving its Windows and iOS counterparts unaffected.
The proof-of-concept analysis revealed that the exploit was often packaged with a pre-existing adware variant, specifically Android/Spy.SpyMax; however, this could be readily replaced with alternative malware chosen by the attacker.
Want to know how Telegram’s builders responded to a critical vulnerability reported by ESET, or learn about the fix timeline, affected users, and protective measures for consumers and businesses? Tune in to our latest ESET Research podcast episode for all the details.
For an in-depth report on EvilVideo or the actions of numerous risk actors, consult ESET’s analysis on [insert relevant date] and review our latest findings on [insert specific topic]. If you enjoy what you’re listening to, consider subscribing at one of our platforms: YouTube, Spotify, or Apple Music.
For attendees at the 2024 ESET Know-how Convention participating in the “Capture the Flag” game, we’re pleased to announce that the flag for the “Radio Broadcast” challenge is: