Telegram’s Security Upgrade: Responding to the ‘Cursed Tapes’ Exploit

Telegram’s Security Upgrade: Responding to the ‘Cursed Tapes’ Exploit

In the ever-evolving world of messaging apps, security remains a top priority. Recently, a significant vulnerability in Telegram for Android came to light, serving as a stark reminder of the ongoing challenges in mobile app security.

Cybersecurity firm ESET uncovered a critical exploit affecting older versions of Telegram. This vulnerability, dubbed the “EvilVideo” exploit, allowed hackers to disguise malicious files as harmless video content. The discovery highlights the importance of constant vigilance in the tech world.

The exploit targeted Telegram versions prior to 10.14.5. Hackers cleverly manipulated Telegram’s API, a tool typically used by developers for content creation and upload. They used this to make harmful files appear as video files within the app.

Here’s how the exploit worked:

  1. A user would receive what appeared to be a video file in a Telegram chat.
  2. Upon attempting to play the “video,” Telegram would claim it couldn’t be played.
  3. The app would then suggest using another application to view the content.
  4. If the user agreed, they would unknowingly install malicious software.

This method was particularly dangerous because it required minimal user interaction to potentially infect a device. It demonstrates how even seemingly innocuous actions can pose significant risks in the digital realm.

ESET’s research team identified this vulnerability on June 26, 2024. They promptly alerted Telegram to the issue. However, their initial report didn’t receive an immediate response. Undeterred, ESET reported the problem again on July 4. This time, Telegram responded swiftly, confirming they were investigating the issue.

Telegram’s response to the vulnerability was commendable. The company quickly developed a fix and released it in version 10.14.5 on July 11, 2024. This update effectively closed the security loophole, protecting users from the EvilVideo exploit.

This incident serves as a crucial reminder for all app users:

  1. Always keep your apps updated to the latest version.
  2. Be cautious when opening files or links, even within trusted apps.
  3. Pay attention to app permissions and be wary of requests to install additional software.

For those interested in a more detailed technical analysis, ESET has published a comprehensive blog post titled “Cursed tapes: Exploiting the EvilVideo vulnerability in Telegram for Android” on their WeLiveSecurity.com website.

The tech community can follow ESET Research on X (formerly Twitter) for the latest updates on cybersecurity threats and vulnerabilities.

In conclusion, while the EvilVideo exploit posed a serious threat, the swift action by both ESET and Telegram demonstrates the importance of collaboration in maintaining digital security. As users, staying informed and keeping our software up-to-date are our best defenses in an increasingly complex digital landscape.

Remember, in the world of technology, security is not just a feature – it’s an ongoing process that requires attention from both developers and users alike.

Share on:


Leave a Reply

Your email address will not be published. Required fields are marked *