Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers May Use Telegram Video to Gain Full Control of Your Phone
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Hackers May Use Telegram Video to Gain Full Control of Your Phone
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Vulnerabilities » Hackers May Use Telegram Video to Gain Full Control of Your Phone

Vulnerabilities

Hackers May Use Telegram Video to Gain Full Control of Your Phone

An alleged Telegram vulnerability can allow hackers to exploit Android phones by tricking users into playing malicious videos through a fake third-party player.

Marco Rizal
Last updated: August 21, 2024 10:03 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Hackers May Use Telegram Video to Gain Full Control of Your Phone
SHARE

An alleged critical vulnerability has been found in Telegram, a popular messaging app, which could potentially endanger millions of Android users.

This vulnerability allows cybercriminals to gain unauthorized access to devices by deceiving users into playing a harmful video using a player from an untrusted source.

The process starts when the victim receives a video message via Telegram. When you try to play the video, an error message pops up, tricking you into thinking you need to use a different player.

After the victim gives their consent and opens the video using the suggested third-party player, their device is infected with a harmful payload.

This payload may claim to be a legitimate external player, but it actually installs itself through the device's package installer and then asks for a wide range of permissions.

A video demonstration uploaded on Twitter by the user @TodayCyberNews provides a clear and concise showcase of the exploit's functionality.

🗿 A vulnerability was found in Telegram that Hacks Android Phones.

– The victim receives a video that is offered to be opened through a third-party player. After consent, the smartphone begins downloading viruses.#bugbounty #CyberSecurity pic.twitter.com/bpMQ57krfa

— Today Cyber News (@TodayCyberNews) July 11, 2024

The attacker sends a video to the target device. When the recipient clicks on it, a fake message appears, falsely claiming that Telegram is unable to play the video. It then guides the victim to install malware by suggesting an external player.

More clear demonstration:

Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. I showed how it is done in the video below. pic.twitter.com/ocEgU1UNR0

— ☣️ (@0x6rss) July 14, 2024

This harmful app asks for complete control over your device, including permission to view phone call logs, text messages, screen recording, audio, camera, and other features. After the user grants these permissions, the attacker will have full control over the device's critical functions.

The video provides a clear demonstration of the attacker's backend terminal, explaining each step of the exploit in a straightforward manner. The exploit's success relies on user interaction, using clickbait videos to trick victims into installing the harmful payload.

Telegram Exploit Image
Image of the alleged Telegram vulnerability

Unfortunately, the demonstration video's clarity is affected by Twitter's video compression, which has caused some doubts about the authenticity of the exploit.

Although the demonstration is quite convincing, there is a chance that the video might be a fabricated proof-of-concept (POC). It is still unclear whether the exploit is legitimate, and Telegram has not yet responded to these claims.

In addition, just last April, Telegram dismissed a different vulnerability in their desktop program as a hoax.

We advise users to refrain from opening unfamiliar videos sent by anonymous individuals on Telegram.

More Stories

BitcoinIRA Security Flaw Allows Hacker to Take Over User Accounts

Bitcoin’s DoS Vulnerability Lets Hackers Crash Miners For Less Than 1% of a Block

First Ransomware Infection on Meta Quest Device

Security Flaw in BlueStacks Threatens Millions of Gamers

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

40 Critical Vulnerabilities Found In Toshiba Printers

40 Critical Vulnerabilities Found In Toshiba Printers

Russia Denies Flaws In E Summons System

Russia Denies Flaws In E-Summons System

This SSL Flaw Puts Millions of .mobi Domains at Risk

This SSL Flaw Puts Millions of .mobi Domains at Risk of Being Hijacked

Major Security Flaws Found in Widely Used Discourse Forum

Major Security Flaws Found in Widely-Used Discourse Forum

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?