{"id":109383,"date":"2023-04-05T10:00:17","date_gmt":"2023-04-05T10:00:17","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109383"},"modified":"2023-04-05T17:54:48","modified_gmt":"2023-04-05T17:54:48","slug":"telegram-phishing-services","status":"publish","type":"post","link":"https:\/\/securelist.com\/telegram-phishing-services\/109383\/","title":{"rendered":"The Telegram phishing market"},"content":{"rendered":"
Telegram has been gaining popularity with users around the world year by year. Common users are not the only ones who have recognized the messaging app’s handy features\u00a0\u2014 cybercrooks have already made it a branch of the dark web, their Telegram activity soaring since late 2021.<\/p>\n
The service is especially popular with phishers. They have become adept at using Telegram both for automating their activities and for providing various services\u00a0\u2014 from selling phishing kits<\/a> to helping with setting up custom phishing campaigns\u00a0\u2014 to all willing to pay.<\/p>\n To promote their “goods”, phishers create Telegram channels through which they educate their audience about phishing and entertain subscribers with polls like, “What type of personal data do you prefer?”. Links to the channels are spread via YouTube, GitHub and phishing kits they make.<\/p>\n This story covers the variety of phishing services available on Telegram, their details and pricing, and ways of detecting phishing content that originates in Telegram.<\/p>\n After reviewing phishers’ Telegram channels that we detected, we broke down the services they promoted into paid and free.<\/p>\n Functional and configurable, Telegram bots help private users and businesses with automating many routine workflows, such as searching for and retrieving information on schedule, answering frequently asked questions from customers, setting up reminders and many others. Malicious actors use Telegram bots to automate illegal activities, such as generating phishing pages or collecting user data.<\/p>\n The process of creating a fake website with a Telegram bot typically includes the following steps:<\/p>\n The wannabe phisher joins the bot creator’s channel.<\/p>\n<\/li>\n As a rule, the bot offers to select a language once started. In the example below, the bot speaks English and Arabic.<\/p>\n <\/a><\/p>\n Starting a Telegram phishing bot<\/em><\/strong><\/p>\n<\/li>\n <\/a><\/p>\n Phishing bot asking the user to set up a new bot and share the token<\/em><\/strong><\/p>\n<\/li>\n <\/a><\/p>\n List of off-the-shelf pages in the same domain<\/em><\/strong><\/p>\n<\/li>\n<\/ol>\n Distributing the links is something the wannabe phisher has to do without any help from the bot. If a visitor enters their credentials on the fake page, a notification will be sent to the chat with the bot that our beginning scammer created while generating links to the fake page. The notification will typically contain the phishing link, the victim’s credentials, the name of the country that they logged in from, the country code and the IP address of the device that was used.<\/p>\n <\/a><\/p>\n Message with the stolen data received by the phisher<\/em><\/strong><\/p>\n Bots that generate phishing pages may differ slightly. For instance, before generating phishing links, one particular bot offers to select a service to mimic and enter a URL the victim will be redirected to after trying to log in. The latter is typically the Google home page or the main page of the service that the phishing page imitates. Once a URL is entered, the bot will generate several scam links targeting users of the service. In this case, victims’ credentials will be sent directly to the phishing bot.<\/p>\n <\/a><\/p>\n List of services suggested by the bot<\/strong><\/em><\/p>\n What are these fake pages that are so easy to generate? A victim who clicks a link in a message that promises, say, 1,000 likes in TikTok will be presented with a login form that looks like the real thing. The page typically contains nothing besides that form. We filled in the login and password fields in the screenshot below.<\/p>\n <\/a><\/p>\n Fake TikTok login page generated by the phishing bot<\/em><\/strong><\/p>\n From an engineering standpoint, this is a rather primitive product of a basic phishing kit<\/a>. When a scammer requests a phishing page from a Telegram bot, it forwards the request along with all required data to a utility that assembles pages from predefined packages and returns hyperlinks. To forward the stolen data to the bot, phishing kits include a script into which the token of the bot that receives user credentials, Telegram bot chat identifier and a URL to redirect the user after entering their credentials will be inserted. Some scripts may lack the URL field.<\/p>\n <\/a><\/p>\n Script to configure stolen data forwarding to the Telegram bot<\/em><\/strong><\/p>\n By the way, there is no reason why the developer of a phishing kit cannot configure it to grab a copy of the data obtained by the unsuspecting newbie phisher.<\/p>\n Scammer-operated Telegram channels sometimes post what appears to be exceptionally generous offers, for example, zipped up sets of ready-to-use phishing kits that target a large number of global and local brands.<\/p>\n <\/a><\/p>\n Archive with phishing kits posted in a Telegram scam channel<\/em><\/strong><\/p>\n <\/a><\/p>\n Contents of a free phishing kit archive<\/em><\/strong><\/p>\n Phishers also share stolen personal data with their subscribers, tagging it with information on whether it was verified or not. “Yellow light data” in the screenshot below stands for “unknown data quality”. This is probably an allusion to the yellow traffic light.<\/p>\n <\/a><\/p>\n Files containing free credentials of US and Russian users<\/em><\/strong><\/p>\n Why would scammers so generously share valuable data with others instead of using it for their own benefit? One reason is that any free content or manuals so willingly distributed by scammers to their Telegram audience serve as bait of sorts for less experienced phishers to bite. Newbies get a taste of what phishing tools can do, pull off their first scam and wish for more, which is when they will be offered paid content.<\/p>\n Another reason is recruiting an unpaid workforce. As mentioned above, the creators of phishing bots and kits can get access to data collected with tools they made. To attract larger audiences, scam operators advertise their services, promising to teach others how to phish for serious cash.<\/p>\n <\/a><\/p>\n Ad for a Telegram channel offering phishing content<\/em><\/strong><\/p>\n Besides free phishing kits and bot-powered scams, Telegram fraudsters offer paid phishing pages and data, as well as phishing-as-a-service (PhaaS) subscriptions. The service may include access to phishing tools, as well as guides for beginners and technical support.<\/p>\n Malicious actors offer “premium” phishing and scam pages for sale. Unlike the primitive copies of popular websites, these offers include pages built from scratch with a range of advanced capabilities or tools for generating such pages. For instance, a “premium” page may include elements of social engineering, such as an appealing design, promises of large earnings, an anti-detection system and so on.<\/p>\n <\/a><\/p>\n Scam pages offered for sale in Telegram<\/em><\/strong><\/p>\n In the screenshot below, the seller promises that each of their “projects” has an anti-bot system, URL encryption, geoblocking and other features that attackers will find useful. The seller goes on to offer custom phishing pages that can include any components requested by the customer.<\/p>\n <\/a><\/p>\n The seller’s description of advanced phishing page functionalities<\/em><\/strong><\/p>\n After looking closer at these offers, we found that they do contain scripts to block web crawlers and anti-phishing technology. Therefore, these projects are essentially complex or advanced phishing kits<\/a>.<\/p>\n <\/a><\/p>\n Contents of a phishing kit archive with an anti-bot system<\/em><\/strong><\/p>\n “Premium page” vendors update their anti-bot systems regularly, so the phishing contents could remain undetected and thus, usable.<\/p>\n <\/a><\/p>\n Phishing page vendor announcing the anti-bot system has been updated<\/em><\/strong><\/p>\n Prices for this kind of fake pages differ, with some vendors asking $10 per copy, and others charging $50 for an archive with several pages in it. A package that includes less frequently offered features, for example, 3-D Secure support, and assistance with configuring a fake website, may cost up to $300.<\/p>\n <\/a><\/p>\n Scam page with 3-D Secure support offered for $280<\/em><\/strong><\/p>\n Online banking credentials obtained through phishing techniques are often offered for sale too. Unlike the free data mentioned above, these have been checked, and even the account balances have been extracted. The higher the balance, the more money scammers will typically charge for the credentials.<\/p>\n For example, the same Telegram channel offered the credentials for a bank account with $1,400 in it for $110, whereas access to an account with a balance of $49,000 was put up for $700.<\/p>\n <\/a><\/p>\n Offer of credentials for an account with a balance of $1,400<\/em><\/strong><\/p>\n <\/a><\/p>\n Offer of credentials for an account with a balance of $49,000<\/em><\/strong><\/p>\n In addition to one-time sales of phishing kits and user data, scammers use Telegram channels to sell a range of subscriptions with customer support included. Support includes providing updates on a regular basis for the phishing tools, anti-detection systems and links generated by the phishing kits.<\/p>\n An OTP (one-time password) bot is another service available by subscription. Legitimate services use one-time passwords as a second authentication factor. Many organizations enforce a two-factor authentication (2FA) requirement these days, which makes it impossible to hijack an account with just the login and password. Phishers use OTP bots to try and hack 2FA.<\/p>\n The bots call users, posing as the organization maintaining the account that the phishers are trying to hack, and convince them to enter a 2FA code on their phones. The calls are fully automated. The bot then enters the code in a required field, giving the phisher access to the account.<\/p>\n <\/a><\/p>\n List of OTP bot features and benefits<\/em><\/strong><\/p>\n According to a bot vendor we talked to, a weekly subscription with unlimited calls will set a beginning scammer back $130, while a monthly subscription including bot customization costs as much as $500.<\/p>\n <\/a><\/p>\n Our chat with the vendor about OTP bot pricing<\/em><\/strong><\/p>\n Another OTP bot is offered on a pay-per-minute, prepaid basis. Rates start at $0.15 per minute depending on the destination. The bot can record calls and store settings, such as the victim’s phone number, name and so on.<\/p>\n <\/a><\/p>\n OTP bot interface: the victim’s name and phone number, service name and language are required for setting up a call<\/em><\/strong><\/p>\n A customer who shares this information with the bot creators, along with a screenshot showing the victim’s account number, balance and other details, may be rewarded with a small amount added to their OTP bot balance: $5 for two units of information and $10 for three or more.<\/p>\n Some PhaaS vendors take their customers’ trust seriously. In the screenshot below, you can see assurances that all data obtained with paid tools is reliably encrypted, so that neither the vendor nor any third parties can read it. All these vendors want is their customers to remain loyal.<\/p>\nThe Telegram black market: what’s on offer<\/h2>\n
Free content for aspiring phishers<\/h3>\n
Automated phishing with Telegram bots<\/h4>\n
\n
Free phishing kits and users’ personal data<\/h4>\n
Paid offers for phishers on Telegram<\/h3>\n
Paid phishing and scam pages<\/h4>\n
User personal data for sale<\/h4>\n
Phishing-as-a-Service<\/h4>\n