Hackers Target Telegram, Instagram Users in Iran

Hackers have been targeting Iranian users of Telegram and Instagram with fake login pages, app clones and BGP hijacking in attacks that have been ongoing since 2017, Cisco Talos reveals.  Banned in Iran, Telegram is a popular target for greyware, software that provides the expected functionality but also suspicious enough to be considered a potentially unwanted program (PUP).

Attacks on Iranian users differ in complexity, based on resources and methods, and those analyzed by Cisco were aimed at stealing personal and login information. As part of these attacks, users were tricked into installing Telegram clones that can access a mobile device’s full contact lists and messages. In addition, fake Instagram apps were designed to send full session data to the attackers, who would then gain full control of the account in use.

Read more about the campaign targeting users in Iran on SecurityWeek.





Gain Deeper Insights Into The Threat

Sign up to gain access to our special reports on threat actors and their tactics as well as daily Threat Brief.

Your support will enable us to continue our production of action-oriented content and help us help you stay informed on the latest in adversary activities.

Try our free two week trial.

Sign Up For Free Trial of The Daily Threat Brief