Malware Campaigns Abusing Telegram Bots to Spread Rapidly

Numerous updates and alterations were witnessed in the major malware families employed in phishing scams during the first quarter of 2023, alongside significant variations in TTPs.

The Cofense Intelligence team has recently published Active Threat Reports, which provide insights into the latest malicious email threats. At the same time, all these reports are based on their thorough observations and analysis of the threats.

During the first quarter (Q1), a substantial increase has been observed in Active Threat Reports, with a 20% increase compared to the previous quarter and a 34% increase compared to Q1 of the previous year.

Malware Campaigns Abusing Telegram Bots

During Q1 of 2023, there has been a significant surge in evasive, malicious campaigns that exploit Telegram bots

The volume of these attacks has increased dramatically, surpassing the volume of Q4 2022 by a staggering 397% and exceeding the entire volume of attacks witnessed in 2022 by 310%.

The volume of credential phishing attacks observed in the current quarter has been highly unstable and witnessed a sharp rise of 527%. 

Compared to the same period last year (Q1 2022), the overall increase in credential phishing attacks is significant, amounting to a rise of 40%.

Despite the significant volume of dissemination, Emotet failed to reach inboxes as frequently as Qakbot, making Qakbot the most successful malware family in terms of reaching inboxes. 

In fact, Qakbot reached inboxes 185% more often than Emotet during the period under observation. During Q1, threat actors have been observed experimenting with various combinations of delivery mechanisms. 

The notable thing is the increased usage of OneNote files as a common delivery mechanism for threats. This indicates threat actors’ continued efforts to refine their methods and evade detection.

The inclusion of YouTube in the list of Top 10 .com domains being exploited by threat actors came as a surprise. 

These actors were observed using open redirects on youtube.com to direct victims toward phishing pages, which is a cause for concern.

Cofense Intelligence conducts a quarterly analysis of credential phishing emails that successfully bypass Secure Email Gateways (SEGs) and reach users’ environments.

This analysis is crucial in identifying the latest tactics and techniques employed by threat actors and helps organizations to protect their users from phishing attacks better.

Building Your Malware Defense Strategy – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

3 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago