Trojanised Telegram APKs target Android users with Janus exploit
Fake Telegram APKs distributed via QR codes exploit Android vulnerabilities to enable remote access and data theft.

A large Android malware campaign has been uncovered, distributing trojanised versions of Telegram Messenger via more than 600 malicious domains. The operation uses phishing infrastructure and evasion techniques to deceive users and deliver infected APK files.
Domains exploit typosquatting, with names like ‘teleqram’ and ‘apktelegram’, and mimic Telegram’s website using cloned visuals and QR code redirects. Users are sent to zifeiji[.]asia, which hosts a fake Telegram site offering APK downloads between 60MB and 70MB.
The malware targets Android versions 5.0 to 8.0, exploiting the Janus vulnerability and bypassing security via legacy signature schemes. After installation, it establishes persistent access using socket callbacks, enabling remote control.
It communicates via unencrypted HTTP and FTP, and uses Android’s MediaPlayer component to trigger background activity unnoticed. Once installed, it requests extensive permissions, including access to all locally stored data.
Domains involved include over 300 on .com, with many registered through Gname, suggesting a coordinated and resilient campaign structure.
Researchers also found a JavaScript tracker embedded at telegramt.net, which collects browser and device data and sends it to dszb77[.]com. The goal appears to be user profiling and behavioural analysis.
Experts warn that the campaign’s scale and technical sophistication pose a significant risk to users running outdated Android systems.
Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!