In Brief:
- Hackers attack crypto wallets through the Telegram app via Echelon malware.
- Echelon malware poses a big threat to Telegram users who use the built-in auto-download feature therein.
- Cyber experts advise users to turn off the auto-download function on their Telegram profile.
Cybercrimes have been on rise especially taking advantage of ‘anonymity’ and ‘decentralisation’ that forms the underpinning attribute of crypto space. In a similar case, a researcher and admin of Immunefi, the bug bounty platform for DeFi discovered that hackers are now targeting crypto wallets using actively using Echelon malware with the auto-download functionality of Telegram.
Echelon malware is a programmed code that has a lot of capabilities to compromise the data and privacy of a user’s computer or mobile device.
Echelon malware poses a big threat to Telegram users who use the built-in auto-download feature therein. As soon as a file is received, the malware is automatically downloaded to the device without the user being aware of it.
After this, the virus will automatically access the computer’s footprint and take screenshots.
As advised by experts, the malware file titled users should act cautiously when dealing with the malware file titled “Smokes night”. This is because it can access information about non-custodial crypto wallets as well. Besides, users are also advised to turn off the auto-download function on their Telegram profile.
As mentioned above, the decentralization and anonymity of cryptos are a boon and sometimes, a curse too. This is quite evident with the surge in cyber scams these days. For instance, recently, PeckShield had warned investors of a possible rug pull event following the identification of a 46.99% price drop on the MGAS token of MetaSwap.