image image image image image image image
image

Of Leaked Bot Telegram Leaks Indian Citizens’ Data At Rs 99 Steps To Secure Yourself Techstory

42726 + 363 OPEN

A pair of cybercriminals inadvertently leaked a “treasure trove” of information on their own operations due to exposure of telegram bot api tokens used by the hackers to exfiltrate victim data, check point researchers revealed last week

The discovery of a telegram bot token in the configuration file of a malware sample that came from one of check point’s customers led the researchers. The technical implementation leverages telegram's robust api infrastructure to create a resilient command and control channel that benefits from telegram’s legitimate infrastructure and encryption capabilities Screenshot of phishing website source code revealing how cybercriminals (1) exfiltrate credentials via (2 and 3) telegram bots. # summary hi i'm a cti analyst and bug bounty hunter , i found a lot of credentials for your domain on the telegram bot ` ` while the exact sources of the leaked data are unknown, the volume of exposed information is substantial This report is submitted for your review to assess and mitigate the exposure of user credentials, including emails and passwords

## note i did not. Leaked bot telegram human verification is a problem because it can allow scammers to access other people’s accounts This could potentially lead to identity theft, financial fraud, and other crimes For example, a scammer could use a leaked bot telegram human verification code to access someone’s email account. Sensitive customer data belonging to star health and allied insurance, india’s largest standalone health insurer, has been openly exposed via chatbots on the hacking telegram messaging app The leak of data includes medical reports, policy details, and even personal information and was discovered by a security researcher who later pointed out the issue to reuters

Infostealer logs analysis this blog post focuses on analyzing logs exfiltrated by infostealers, specifically to telegram, through their bot api

Unlike logs present in clouds of logs, which can come from a variety of different places, the ones we analyzed were obtained directly from threat actors' telegram bots. Most telegram bots that search for and provide personal data upon user request operate using osint (open source intelligence) methods They rely on publicly available sources by exploiting apis from various services and internet resources Some bots use leaked databases, but these services often face issues

OPEN