Cyber Security News

Hackers Hijack Telegram Accounts via Default Voicemail Passwords

The Israeli Internet Association has issued a public warning about a surge in cyberattacks targeting Telegram accounts in Israel.

The campaign, traced to hackers in Bangladesh and Indonesia, exploits vulnerabilities in voicemail systems to hijack accounts and, in some cases, register new ones using phone numbers of individuals who have never used Telegram, including minors.

This wave of attacks appears to be part of a broader cyber campaign linked to recent incidents since the onset of the Iron Swords war.

While the exact motives remain unclear, experts speculate that the operation could aim to spread terror, manipulate public discourse, or pursue criminal objectives.

Exploiting Voicemail Vulnerabilities

The attackers leverage a common security flaw: many users fail to change their default voicemail PINs, which are often set to simple combinations like “1234.”

The attack begins when hackers initiate a Telegram login attempt on a victim’s account.

If the SMS verification option is bypassed, Telegram sends the verification code via voice call.

If the victim does not answer the call, the code is left as a voicemail message.

Hackers then remotely access the victim’s voicemail using the default PIN and retrieve the code, enabling them to log into the account.

In some cases, hackers place decoy calls from foreign or masked numbers often using Bangladeshi dialing codes to ensure that victims miss the verification call.

Once inside the account, attackers disconnect all devices linked to it, effectively locking out the original user.

The compromised accounts are then exploited for impersonation, phishing schemes, scams targeting contacts, or distribution of illegal content.

Persistent and Invasive Methods

Unlike typical WhatsApp attacks that rely on message chains, this campaign employs more invasive techniques by accessing users’ personal voicemail systems.

Yonatan Ben Hurin, director of Israel’s Safe Internet Help Line, described this method as particularly concerning due to Telegram’s design, which stores users’ entire chat history on their accounts.

Some victims reported that their profile pictures were changed to images of attractive Asian women after their accounts were hijacked likely as part of phishing or extortion schemes.

According to the Report, the use of fake female profiles is a known tactic in social engineering attacks.

To safeguard against these attacks, cybersecurity experts strongly advise disabling voicemail services altogether or changing default voicemail PINs to strong and unique passwords.

Users should also activate Telegram’s two-step verification feature by navigating to Settings > Privacy and Security > Two-Step Verification.

This additional layer of security can prevent unauthorized access even if hackers obtain verification codes.

Furthermore, individuals who notice suspicious activity such as alerts about email changes or logins from unknown devices should act immediately by removing unfamiliar email addresses in Telegram settings and terminating unauthorized sessions via Settings > Devices > Terminate All Other Sessions.

For users locked out of their accounts, Telegram offers a one-week waiting period for email reset requests.

Alternatively, those subscribed to Telegram Premium can recover their accounts instantly through SMS verification.

The Israeli Internet Association highlighted that this campaign demonstrates persistence and sophistication in its approach.

Reports of such incidents have surged in recent weeks, prompting Tuesday’s public alert.

Given Israel’s history of cyber incidents originating from Bangladesh and Indonesia during geopolitical conflicts, these attacks underscore the importance of robust cybersecurity measures.

While authorities continue to investigate whether these operations are terror-related or criminally motivated, individuals are urged to remain vigilant and adopt best practices for securing their digital accounts.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…

12 minutes ago

Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE

Lattica, an FHE-based platform enabling secure and private use of AI in the cloud, has…

32 minutes ago

FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code

A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed,…

39 minutes ago

New Malware Hijacks Docker Images Using Unique Obfuscation Technique

A recently uncovered malware campaign targeting Docker, one of the most frequently attacked services according…

2 hours ago

Critical Browser Wallet Vulnerabilities Enable Unauthorized Fund Transfers

Researchers have disclosed a series of alarming vulnerabilities in popular browser-based cryptocurrency wallets that could…

2 hours ago

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as OilRig,…

3 hours ago