Telegram Zero-Day for Android Allowed Malicious Files To Masquerade as Videos
A zero-day exploit was discovered for the Telegram messaging app on Android, which allowed attackers to send malicious payloads that appeared as legitimate video files. The vulnerability, named EvilVideo by ESET, a Slovakia-based firm, was patched by Telegram in versions 10.14.5 and above after being reported by researchers. The exploit was active for approximately five weeks before the patch and was found being sold on an underground forum by a user named "Ancryno." Attackers could send the malicious payloads through Telegram channels, groups, and chats, exploiting the app's default setting of automatically downloading media files. Users could still be compromised if they manually downloaded the file, which would prompt them to play it with an external player disguised as a malicious app. It is unclear if the exploit was used in any attacks. Malware: EvilVideo [View Article](https://yro.slashdot.org/story/24/07/22/1913238/telegram-zero-day-for-android-allowed-malicious-files-to-masquerade-as-videos)