Categories: cyber security

Telegram Increasingly Abused For Selling Stolen Financial Details

The cybercriminals are actively abusing the Telegram messenger for setting up underground channels and selling stolen financial details on them and also executing their other illicit activities as well.

Why are threat actors abusing Telegram instant messaging service? 

They did so due to its features and user base, as Telegram has an active user base of more than 500 million, and not only it also offers end-to-end encryption communication to its users.

While apart from this, here we have mentioned other six key reasons due to which the threat actors find Telegram as one of the most lucrative selection to promote their malicious activities:-

  • The approach of loose moderation.
  • Only censoring extremist content.
  • Easier to set up a Telegram channel.
  • Easier to promote and draw a wider audience.
  • Telegram channels are more volatile and short-lived.
  • Telegram channels are harder to track.

An Abiding Trouble

In a recently published report, the cyber security experts at Cybersixgill have justified the data that they have collected throughout the following years:- 

  • 2020
  • 2021

As they have claimed there is a tremendous drop in the sale volume of financial accounts in Telegram, but, it doesn’t mean that it’s an end, so, it still remains a stable issue.

During the analysis, the bot spam was filtered and mainly targeted the focus on the high-quality data in which several keywords were identified that are related to:-

  • Financial account sales.
  • Money laundering.

Here, as compared to the report of 2020 the stark nosedive of 60% is the prevailing reduction of newly-issued credit cards that are issued during the pandemic.

Here’s what Cybersixgill’s analysts stated:-

“This stark nosedive in the discourse surrounding compromised accounts from 2020 to 2021 might seem remarkable, but it is not an isolated event; a parallel decrease was also identified in the total number of compromised credit cards sold on underground markets throughout the same period.”

Moreover, among all the mediums the threat actors have actively abused the services of PayPal that is followed by Chase and Western Union, as in the graph below you can see.

The attackers targeted and abused PayPal most due to its two key features:-

  • The direct way to drain funds from other people.
  • Easy to make online purchases.

Most of the compromised accounts were used by the buyers for purchasing cryptocurrencies, and they are hard-to-trace which makes the execution of money laundering easier for the threat actors.

Credit Cards and Bank Logs

On Telegram channels at a smaller volume, credit cards are also offered by the threat actors. And price range varies between $10 to $1,500 for a single card, all these depend on the following points:-

  • Bank account balance.
  • The freshness of the data.

All the stolen and compromised cards that are sold belong to the following services mainly:-

  • Chase Bank
  • Bank of America
  • Wells Fargo
  • Western Union
  • Visa
  • Mastercard

While apart from this, along with stolen credit cards, the attackers also sell compromised dank credentials, which are termed as “Logs” on the dark web.

On Telegram channels, all these are just a tiny part of the activities executed by the threat actors since Telegram offers several easy-to-use features and hard-to-trace anonymity which make this platform more vicious.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Easily Bypass Active Directory Group Policy to Allow Vulnerable NTLMv1 Auth Protocol

Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured on-premises…

21 hours ago

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions…

2 days ago

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing…

2 days ago

New Tool Unveiled to Scan Hacking Content on Telegram

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI…

2 days ago

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables…

2 days ago

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address…

2 days ago