Fake Telegram Premium site spreads dangerous malware
Malware steals passwords, crypto data and system info without clicks.
A fake Telegram Premium website infects users with Lumma Stealer malware through a drive-by download, requiring no user interaction.
The domain, telegrampremium[.]app, hosts a malicious executable named start.exe, which begins stealing sensitive data as soon as it runs.
The malware targets browser-stored credentials, crypto wallets, clipboard data and system files, using advanced evasion techniques to bypass antivirus tools.
Obfuscated with cryptors and hidden behind real services like Telegram, the malware also communicates with temporary domains to avoid takedown.
Analysts warn that it manipulates Windows systems, evades detection, and leaves little trace by disguising its payloads as real image files.
To defend against such threats, organisations are urged to implement better cybersecurity controls, such as behaviour-based detection and enforce stronger download controls.
Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!