TechnoSports Media Group
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment
No Result
View All Result
TechnoSports Media Group
No Result
View All Result

ESET Research discovers StrongPity APT group’s espionage campaign targeting Android users with trojanized Telegram app

Rahul Roy by Rahul Roy
January 11, 2023
in News, Social Media, Technology
0
Telegram Added Over 70 Million New Users During Facebook Outage
  • ESET researchers identified an active StrongPity campaign distributing a fully functional but trojanized version of the legitimate Telegram app.
  • This is the first time that the described modules and their functionality have been documented publicly.
  • StrongPity’s backdoor is modular and has various spying features, such as recording phone calls, collecting SMS messages, collecting lists of call logs and contact lists, and much more.
  • If the victim grants the malicious StrongPity app notification access and accessibility services, the malware is able to exfiltrate communication from messaging apps such as Viber, Skype, Gmail, Messenger, and Tinder.  
  • A copycat website mimicking Shagle, an adult video-chat service, is used to distribute StrongPity’s mobile backdoor app.
  • The app is a modified version of the open-source Telegram app, repackaged with StrongPity backdoor code.
  • Based on similarities with previous StrongPity backdoor code and the app being signed with a certificate from an earlier StrongPity campaign, we attribute this threat to the StrongPity APT group.

ESET researchers identified an active StrongPity APT group campaign leveraging a fully functional but trojanized version of the legitimate Telegram app, which despite being non-existent, has been repackaged as „the“ Shagle app. This StrongPity backdoor has various spying features: its 11 dynamically triggered modules are responsible for recording phone calls, collecting SMS messages, collecting lists of call logs, and contact lists, and much more.

These modules are being documented publicly for the very first time. If the victim grants the malicious StrongPity app notification access and accessibility services, the app will also have access to incoming notifications from 17 apps such as Viber, Skype, Gmail, Messenger, and Tinder, and will be able to exfiltrate chat communication from other apps. The campaign is likely very narrowly targeted, since ESET telemetry still hasn’t identify any victims. 

RelatedPosts

Shahbaz Ahmed’s Magic Show in Ranji Trophy: Bengal Demolish Railways by Innings and 120 Runs

History in the Making: Richa Ghosh Becomes First Female Cricketer in India to Get Her Own Stadium

Airtel Quietly Axes ₹189 Plan: Budget Users Face 10% Hike as ₹199 Becomes New Entry Point

Unlike the entirely web-based, genuine Shagle site, which doesn’t offer an official mobile app to access its services, the copycat site only provides an Android app to download, with no web-based streaming possible. This trojanized Telegram app has never been made available from the Google Play store.

The malicious code, its functionality, class names, and the certificate used to sign the APK file, are the identical to the previous campaign; thus ESET believes with high confidence that this operation belongs to the StrongPity group. Code analysis revealed that the backdoor is modular and additional binary modules are downloaded from the C&C server. This means that the number and type of modules used can be changed at any time to fit the campaign requests when operated by the StrongPity group.

ESET Research discovers StrongPity APT group’s espionage campaign targeting Android users with trojanized Telegram app

“During our research, the analyzed version of malware available from the copycat website was not active anymore and it was no longer possible to successfully install and trigger its backdoor functionality. This is because StrongPity hasn’t obtained its own API ID for its trojanized Telegram app. But that might change at any time should the threat actor decide to update the malicious app,” says Lukáš Štefanko, the ESET researcher who analyzed the trojanized Telegram app.

The repackaged version of Telegram uses the same package name as the legitimate Telegram app. Package names are supposed to be unique IDs for each Android app and must be unique on any given device. This means that if the official Telegram app is already installed on the device of a potential victim, then this backdoored version can’t be installed. “This might mean one of two things – either the threat actor first communicates with potential victims and pushes them to uninstall Telegram from their devices if it is installed, or the campaign focuses on countries where Telegram usage is rare for communication,” adds Štefanko.

StrongPity’s app should have worked just as the official version does for communication, using standard APIs that are well documented on the Telegram website, but it no longer does. Compared to the first StrongPity malware discovered for mobile, this StrongPity backdoor has extended spying features, being able to spy on incoming notifications and exfiltrate chat communication, if the victim grants the app notification access and activates accessibility services.

Read: Amazon Great Republic Day Sale is coming, 17th to 20th January

Tags: StrongPityAPTTelegram
Previous Post

All India Gaming Federation supports the draft rules released by Government for the online gaming sector

Next Post

Virat Kohli make an outstanding comeback in cricket by smashing back-to-back ODI centuries

Related Posts

Ranji Trophy
Cricket

Shahbaz Ahmed’s Magic Show in Ranji Trophy: Bengal Demolish Railways by Innings and 120 Runs

November 11, 2025
Richa Ghosh
News

History in the Making: Richa Ghosh Becomes First Female Cricketer in India to Get Her Own Stadium

November 11, 2025
Airtel
News

Airtel Quietly Axes ₹189 Plan: Budget Users Face 10% Hike as ₹199 Becomes New Entry Point

November 11, 2025
Technology

TeamViewer Launches Agentless Access for Industrial Remote Ops

November 11, 2025
Technology

Titan Smart Evoke 2.0: Fashion Meets Tech at ₹8,499

November 11, 2025
News

Airtel Payments Bank Crosses ₹800 Crore Quarterly Revenue

November 11, 2025
Next Post
Virat Kohli's outstanding comeback in cricket, smashing back-to-back centuries

Virat Kohli make an outstanding comeback in cricket by smashing back-to-back ODI centuries

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

TechnoSports Media Group

© 2025 TechnoSports Media Group - The Ultimate News Destination

Email: admin@technosports.co.in

  • Terms of Use
  • Privacy Policy
  • About Us
  • Contact Us

Follow Us

No Result
View All Result
  • Home
  • Technology
  • Smartphones
  • Deal
  • Sports
  • Reviews
  • Gaming
  • Entertainment

© 2025 TechnoSports Media Group - The Ultimate News Destination