{"id":109383,"date":"2023-04-05T10:00:17","date_gmt":"2023-04-05T10:00:17","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109383"},"modified":"2023-04-05T17:54:48","modified_gmt":"2023-04-05T17:54:48","slug":"telegram-phishing-services","status":"publish","type":"post","link":"https:\/\/securelist.com\/telegram-phishing-services\/109383\/","title":{"rendered":"The Telegram phishing market"},"content":{"rendered":"

Telegram has been gaining popularity with users around the world year by year. Common users are not the only ones who have recognized the messaging app’s handy features\u00a0\u2014 cybercrooks have already made it a branch of the dark web, their Telegram activity soaring since late 2021.<\/p>\n

The service is especially popular with phishers. They have become adept at using Telegram both for automating their activities and for providing various services\u00a0\u2014 from selling phishing kits<\/a> to helping with setting up custom phishing campaigns\u00a0\u2014 to all willing to pay.<\/p>\n

To promote their “goods”, phishers create Telegram channels through which they educate their audience about phishing and entertain subscribers with polls like, “What type of personal data do you prefer?”. Links to the channels are spread via YouTube, GitHub and phishing kits they make.<\/p>\n

This story covers the variety of phishing services available on Telegram, their details and pricing, and ways of detecting phishing content that originates in Telegram.<\/p>\n

The Telegram black market: what’s on offer<\/h2>\n

After reviewing phishers’ Telegram channels that we detected, we broke down the services they promoted into paid and free.<\/p>\n

Free content for aspiring phishers<\/h3>\n

Automated phishing with Telegram bots<\/h4>\n

Functional and configurable, Telegram bots help private users and businesses with automating many routine workflows, such as searching for and retrieving information on schedule, answering frequently asked questions from customers, setting up reminders and many others. Malicious actors use Telegram bots to automate illegal activities, such as generating phishing pages or collecting user data.<\/p>\n

The process of creating a fake website with a Telegram bot typically includes the following steps:<\/p>\n

    \n
  1. \n

    The wannabe phisher joins the bot creator’s channel.<\/p>\n<\/li>\n

  2. \n

    As a rule, the bot offers to select a language once started. In the example below, the bot speaks English and Arabic.<\/p>\n

    \"Starting<\/a><\/p>\n

    Starting a Telegram phishing bot<\/em><\/strong><\/p>\n<\/li>\n

  3. The bot offers the user to create a new bot of their own and share the token with the main bot. The purpose of this second bot is to capture data of users who follow the phishing links and attempt to log in to the fake website. It is the budding scammer’s job to set up that new bot on Telegram, but that process is also automated and no rocket science.\n

    \"Phishing<\/a><\/p>\n

    Phishing bot asking the user to set up a new bot and share the token<\/em><\/strong><\/p>\n<\/li>\n

  4. Once the user feeds the token to the first bot, it generates a series of links to fake websites hosted in the same domain. The sites may mimic various services: PUBG, Facebook, PayPal and so on.\n

    \"List<\/a><\/p>\n

    List of off-the-shelf pages in the same domain<\/em><\/strong><\/p>\n<\/li>\n<\/ol>\n

    Distributing the links is something the wannabe phisher has to do without any help from the bot. If a visitor enters their credentials on the fake page, a notification will be sent to the chat with the bot that our beginning scammer created while generating links to the fake page. The notification will typically contain the phishing link, the victim’s credentials, the name of the country that they logged in from, the country code and the IP address of the device that was used.<\/p>\n

    \"Message<\/a><\/p>\n

    Message with the stolen data received by the phisher<\/em><\/strong><\/p>\n

    Bots that generate phishing pages may differ slightly. For instance, before generating phishing links, one particular bot offers to select a service to mimic and enter a URL the victim will be redirected to after trying to log in. The latter is typically the Google home page or the main page of the service that the phishing page imitates. Once a URL is entered, the bot will generate several scam links targeting users of the service. In this case, victims’ credentials will be sent directly to the phishing bot.<\/p>\n

    \"List<\/a><\/p>\n

    List of services suggested by the bot<\/strong><\/em><\/p>\n

    What are these fake pages that are so easy to generate? A victim who clicks a link in a message that promises, say, 1,000 likes in TikTok will be presented with a login form that looks like the real thing. The page typically contains nothing besides that form. We filled in the login and password fields in the screenshot below.<\/p>\n

    \"Fake<\/a><\/p>\n

    Fake TikTok login page generated by the phishing bot<\/em><\/strong><\/p>\n

    From an engineering standpoint, this is a rather primitive product of a basic phishing kit<\/a>. When a scammer requests a phishing page from a Telegram bot, it forwards the request along with all required data to a utility that assembles pages from predefined packages and returns hyperlinks. To forward the stolen data to the bot, phishing kits include a script into which the token of the bot that receives user credentials, Telegram bot chat identifier and a URL to redirect the user after entering their credentials will be inserted. Some scripts may lack the URL field.<\/p>\n

    \"Script<\/a><\/p>\n

    Script to configure stolen data forwarding to the Telegram bot<\/em><\/strong><\/p>\n

    By the way, there is no reason why the developer of a phishing kit cannot configure it to grab a copy of the data obtained by the unsuspecting newbie phisher.<\/p>\n

    Free phishing kits and users’ personal data<\/h4>\n

    Scammer-operated Telegram channels sometimes post what appears to be exceptionally generous offers, for example, zipped up sets of ready-to-use phishing kits that target a large number of global and local brands.<\/p>\n

    \"Archive<\/a><\/p>\n

    Archive with phishing kits posted in a Telegram scam channel<\/em><\/strong><\/p>\n

    \"Contents<\/a><\/p>\n

    Contents of a free phishing kit archive<\/em><\/strong><\/p>\n

    Phishers also share stolen personal data with their subscribers, tagging it with information on whether it was verified or not. “Yellow light data” in the screenshot below stands for “unknown data quality”. This is probably an allusion to the yellow traffic light.<\/p>\n

    \"Files<\/a><\/p>\n

    Files containing free credentials of US and Russian users<\/em><\/strong><\/p>\n

    Why would scammers so generously share valuable data with others instead of using it for their own benefit? One reason is that any free content or manuals so willingly distributed by scammers to their Telegram audience serve as bait of sorts for less experienced phishers to bite. Newbies get a taste of what phishing tools can do, pull off their first scam and wish for more, which is when they will be offered paid content.<\/p>\n

    Another reason is recruiting an unpaid workforce. As mentioned above, the creators of phishing bots and kits can get access to data collected with tools they made. To attract larger audiences, scam operators advertise their services, promising to teach others how to phish for serious cash.<\/p>\n

    \"Ad<\/a><\/p>\n

    Ad for a Telegram channel offering phishing content<\/em><\/strong><\/p>\n

    Paid offers for phishers on Telegram<\/h3>\n

    Besides free phishing kits and bot-powered scams, Telegram fraudsters offer paid phishing pages and data, as well as phishing-as-a-service (PhaaS) subscriptions. The service may include access to phishing tools, as well as guides for beginners and technical support.<\/p>\n

    Paid phishing and scam pages<\/h4>\n

    Malicious actors offer “premium” phishing and scam pages for sale. Unlike the primitive copies of popular websites, these offers include pages built from scratch with a range of advanced capabilities or tools for generating such pages. For instance, a “premium” page may include elements of social engineering, such as an appealing design, promises of large earnings, an anti-detection system and so on.<\/p>\n

    \"Scam<\/a><\/p>\n

    Scam pages offered for sale in Telegram<\/em><\/strong><\/p>\n

    In the screenshot below, the seller promises that each of their “projects” has an anti-bot system, URL encryption, geoblocking and other features that attackers will find useful. The seller goes on to offer custom phishing pages that can include any components requested by the customer.<\/p>\n

    \"The<\/a><\/p>\n

    The seller’s description of advanced phishing page functionalities<\/em><\/strong><\/p>\n

    After looking closer at these offers, we found that they do contain scripts to block web crawlers and anti-phishing technology. Therefore, these projects are essentially complex or advanced phishing kits<\/a>.<\/p>\n

    \"Contents<\/a><\/p>\n

    Contents of a phishing kit archive with an anti-bot system<\/em><\/strong><\/p>\n

    “Premium page” vendors update their anti-bot systems regularly, so the phishing contents could remain undetected and thus, usable.<\/p>\n

    \"Phishing<\/a><\/p>\n

    Phishing page vendor announcing the anti-bot system has been updated<\/em><\/strong><\/p>\n

    Prices for this kind of fake pages differ, with some vendors asking $10 per copy, and others charging $50 for an archive with several pages in it. A package that includes less frequently offered features, for example, 3-D Secure support, and assistance with configuring a fake website, may cost up to $300.<\/p>\n

    \"Scam<\/a><\/p>\n

    Scam page with 3-D Secure support offered for $280<\/em><\/strong><\/p>\n

    User personal data for sale<\/h4>\n

    Online banking credentials obtained through phishing techniques are often offered for sale too. Unlike the free data mentioned above, these have been checked, and even the account balances have been extracted. The higher the balance, the more money scammers will typically charge for the credentials.<\/p>\n

    For example, the same Telegram channel offered the credentials for a bank account with $1,400 in it for $110, whereas access to an account with a balance of $49,000 was put up for $700.<\/p>\n

    \"Offer<\/a><\/p>\n

    Offer of credentials for an account with a balance of $1,400<\/em><\/strong><\/p>\n

    \"Offer<\/a><\/p>\n

    Offer of credentials for an account with a balance of $49,000<\/em><\/strong><\/p>\n

    Phishing-as-a-Service<\/h4>\n

    In addition to one-time sales of phishing kits and user data, scammers use Telegram channels to sell a range of subscriptions with customer support included. Support includes providing updates on a regular basis for the phishing tools, anti-detection systems and links generated by the phishing kits.<\/p>\n

    An OTP (one-time password) bot is another service available by subscription. Legitimate services use one-time passwords as a second authentication factor. Many organizations enforce a two-factor authentication (2FA) requirement these days, which makes it impossible to hijack an account with just the login and password. Phishers use OTP bots to try and hack 2FA.<\/p>\n

    The bots call users, posing as the organization maintaining the account that the phishers are trying to hack, and convince them to enter a 2FA code on their phones. The calls are fully automated. The bot then enters the code in a required field, giving the phisher access to the account.<\/p>\n

    \"List<\/a><\/p>\n

    List of OTP bot features and benefits<\/em><\/strong><\/p>\n

    According to a bot vendor we talked to, a weekly subscription with unlimited calls will set a beginning scammer back $130, while a monthly subscription including bot customization costs as much as $500.<\/p>\n

    \"Our<\/a><\/p>\n

    Our chat with the vendor about OTP bot pricing<\/em><\/strong><\/p>\n

    Another OTP bot is offered on a pay-per-minute, prepaid basis. Rates start at $0.15 per minute depending on the destination. The bot can record calls and store settings, such as the victim’s phone number, name and so on.<\/p>\n

    \"OTP<\/a><\/p>\n

    OTP bot interface: the victim’s name and phone number, service name and language are required for setting up a call<\/em><\/strong><\/p>\n

    A customer who shares this information with the bot creators, along with a screenshot showing the victim’s account number, balance and other details, may be rewarded with a small amount added to their OTP bot balance: $5 for two units of information and $10 for three or more.<\/p>\n

    Some PhaaS vendors take their customers’ trust seriously. In the screenshot below, you can see assurances that all data obtained with paid tools is reliably encrypted, so that neither the vendor nor any third parties can read it. All these vendors want is their customers to remain loyal.<\/p>\n

    \"PhaaS<\/a><\/p>\n

    PhaaS vendor explaining to customers that all their data is reliably encrypted<\/em><\/strong><\/p>\n

    Detection and statistics<\/h2>\n

    Despite phishers who offer their services in Telegram use many ways to avoid blocking<\/a>, our systems detect their fake sites with maximum precision, adding them to our databases.<\/p>\n

    Malicious sites generated by phishing bots are either hosted in the same domain, or share parts of HTML code, or both. This makes it easy for our cyberthreat detection technology to discover them.<\/p>\n

    In the above example of a bot generating phishing pages the same domain was used to host fake websites that mimicked those of various legitimate organizations. We have detected a total of 1483 attempts to access pages located in that domain since it emerged.<\/p>\n

    <\/div>\n

    Kaspersky anti-phishing detection statistics for a domain linked to a phishing bot, December 2022 through March 2023 (download<\/a>)<\/em><\/p>\n

    Since many off-the-shelf phishing solutions offered on Telegram are basic or complex phishing kits, here are some relevant detection statistics on those. In the last six months, our technology has detected 2.5 million malicious URLs generated with phishing kits.<\/p>\n

    <\/div>\n

    Number of detected malicious URLs generated with phishing kits, October 2022 through March 2023 (download<\/a>)<\/em><\/p>\n

    We prevented 7.1 million attempts by users to access these malicious sites within the same period.<\/p>\n

    <\/div>\n

    Kaspersky anti-phishing detection statistics for pages generated with phishing kits, October 2022 through March 2023 (download<\/a>)<\/em><\/p>\n

    Takeaways<\/h2>\n

    Wannabe phishers used to need to find a way onto the dark web, study the forums there and do other things to get started. The threshold to joining the phisher community lowered once malicious actors migrated to Telegram and now share insights and knowledge, often for free, right there in the popular messaging service.<\/p>\n

    Even the laziest and most cash-strapped can use Telegram bots offered by channel owners to generate phishing pages and obtain data stolen from their victims. Some attackers upload archives with data for anyone to make use of. An aspiring phisher who wishes to generate a greater variety of content can download phishing kits that target a wide range of organizations.<\/p>\n

    Scammers use an array of free offers to promote paid services. They are also likely manipulating newcomers into using their free phishing kits and bots, which can potentially share stolen data with their creators.<\/p>\n

    The more solvent audience are offered to pay for phishing pages with geoblocking functionality and regularly updated anti-bot systems, which are harder to detect than those generated with basic phishing kits and bots. Prices range from $10 to $300 and depend on the feature set. Phishers also sell stolen online baking credentials and offer OTP bots subscriptions that can be used to bypass 2FA.<\/p>\n

    A detailed review of available offers on Telegram phishing channels suggests that the bulk of these consists of phishing kits, which our technology successfully blocks: over the last six months, we have detected 2.5 million pages generated with phishing kits.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Phishing bots and services on Telegram: how malicious actors use the messaging app to automate the process of generating phishing pages, and sell phishing kits and data.<\/p>\n","protected":false},"author":4704,"featured_media":102755,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[24],"tags":[472,459,723,3124,1053,4340,1052],"banners":"","hreflang":[{"hreflang":"x-default","url":"https:\/\/securelist.com\/telegram-phishing-services\/109383\/"},{"hreflang":"ru","url":"https:\/\/securelist.ru\/telegram-phishing-services\/107193\/"},{"hreflang":"es","url":"https:\/\/securelist.lat\/telegram-phishing-services\/97767\/"}],"_links":{"self":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/109383"}],"collection":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/users\/4704"}],"replies":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/comments?post=109383"}],"version-history":[{"count":11,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/109383\/revisions"}],"predecessor-version":[{"id":109449,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/109383\/revisions\/109449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media\/102755"}],"wp:attachment":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media?parent=109383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/categories?post=109383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/tags?post=109383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}