Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Phishing in Telegram Mini Apps: how to avoid taking the bait | Kaspersky official blog

0
Medium
Phishing
Published: Tue Dec 16 2025 (12/16/2025, 16:34:04 UTC)
Source: Kaspersky Security Blog

Description

new phishing scam is exploiting Telegram’s built-in Mini Apps: fraudsters are running fake giveaways to steal accounts. Here’s how to protect yourself.

AI-Powered Analysis

AILast updated: 12/16/2025, 16:41:40 UTC

Technical Analysis

This phishing threat leverages Telegram's Mini Apps platform, which allows developers to create embedded web applications running inside the Telegram client without external browser redirection. Unlike app stores with strict vetting, Telegram Mini Apps undergo minimal to no pre-launch review, enabling attackers to publish malicious apps easily. The scam involves fake giveaways of digital collectibles (NFT-style 'gifts' such as 'papakhas' linked to celebrities like Khabib Nurmagomedov) promoted via direct messages or channel posts. Victims are enticed to launch a Mini App within Telegram and enter their login credentials into a phishing form embedded in the app. Because the app runs inside Telegram, users mistakenly trust its legitimacy. The attackers also mimic legitimate platforms like Portals, including referencing official Telegram channels to add credibility. The phishing messages sometimes contain AI-generated text artifacts, indicating rushed or automated content creation. Once credentials are submitted, attackers hijack the Telegram account, potentially gaining access to private chats, contacts, and linked services. Telegram's reactive moderation means malicious Mini Apps remain live until reported. The campaign is multilingual (Russian and English) and targets users interested in specific channels or digital assets. Mitigation focuses on user vigilance, verification of sources and badges, enabling two-factor authentication and passkeys, and avoiding credential entry in Mini Apps. The threat does not exploit a software vulnerability but abuses Telegram's platform design and user trust.

Potential Impact

For European organizations, the primary risk is the compromise of employee Telegram accounts, which can lead to unauthorized access to sensitive communications, social engineering attacks leveraging hijacked accounts, and potential lateral movement if Telegram is used for business communications or authentication. Account takeover can also facilitate fraud, data leakage, or reputational damage if attackers impersonate employees. Given Telegram's popularity in Europe for both personal and professional use, especially in sectors like media, technology, and finance, compromised accounts could disrupt operations and expose confidential information. The phishing campaign's reliance on social engineering means that organizations with less security awareness training are more vulnerable. Additionally, attackers could use hijacked accounts to target corporate contacts or spread malware. The lack of technical exploitation reduces the risk of widespread automated compromise but increases the importance of user education and account security hygiene.

Mitigation Recommendations

1. Educate employees about the risks of Telegram Mini Apps phishing, emphasizing that legitimate Telegram services rarely require re-authentication within Mini Apps. 2. Train users to verify the authenticity of giveaway offers by checking official Telegram channels and verifying account badges by tapping the blue checkmark. 3. Enforce the use of Telegram's two-step verification (password) and passkeys to add strong layers of account protection. 4. Encourage the use of password managers to generate and store strong, unique passwords and passkeys. 5. Implement organizational policies restricting the use of Telegram Mini Apps for business-critical communications or require IT approval. 6. Deploy endpoint security solutions with anti-phishing capabilities that can detect malicious links or embedded phishing attempts within apps. 7. Monitor for signs of account compromise, such as unusual login activity or unauthorized messages sent from employee accounts. 8. Establish incident response procedures for rapid recovery of compromised Telegram accounts, including immediate password resets and notifying contacts. 9. Promote skepticism towards unsolicited offers, especially those promising free digital assets or requiring credential input. 10. Collaborate with Telegram support and law enforcement to report and take down malicious Mini Apps promptly.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/telegram-mini-app-phishing/55041/","fetched":true,"fetchedAt":"2025-12-16T16:41:25.900Z","wordCount":2006}

Threat ID: 69418bb53e7fd18214c3d792

Added to database: 12/16/2025, 4:41:25 PM

Last enriched: 12/16/2025, 4:41:40 PM

Last updated: 12/17/2025, 4:15:30 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats