Telegram phishing and related activities
Telegram phishing and related activities
AI Analysis
Technical Summary
The reported threat pertains to phishing activities conducted through the Telegram messaging platform. Phishing, classified under MITRE ATT&CK pattern T1566, involves attackers sending deceptive messages to trick users into revealing sensitive information such as login credentials, financial data, or personally identifiable information. Telegram, a widely used encrypted messaging app, provides a vector for such attacks due to its popularity and the ease of creating channels or groups that can reach large audiences. Unlike software vulnerabilities, this threat exploits human factors rather than technical flaws. Attackers may impersonate trusted contacts or organizations, distribute malicious links, or use fake Telegram bots to harvest credentials. The absence of affected software versions or patches indicates that this is a behavioral threat rather than a technical vulnerability. The medium severity rating reflects the potential damage from successful phishing attempts, including unauthorized access to corporate systems, data breaches, or financial fraud. The threat is persistent and ongoing, as indicated by the 'perpetual' OSINT lifetime tag, and is relevant to network activity monitoring and incident response teams. No known exploits in the wild or automated attack tools have been reported, emphasizing the social engineering nature of the threat.
Potential Impact
For European organizations, the impact of Telegram-based phishing can be significant, particularly for those relying on Telegram for internal communication, customer support, or marketing. Successful phishing attacks can lead to credential compromise, enabling attackers to access corporate networks, exfiltrate sensitive data, or conduct further attacks such as business email compromise or ransomware deployment. The confidentiality of user and organizational data is primarily at risk, with potential secondary impacts on data integrity and system availability if attackers leverage stolen credentials to escalate privileges or disrupt operations. Sectors with high digital engagement, such as finance, technology, and government, are particularly vulnerable. Additionally, the use of Telegram in some European countries is substantial, increasing the attack surface. The threat also poses reputational risks if customers or partners are targeted via phishing campaigns impersonating the organization. Given the social engineering basis, the impact depends heavily on user awareness and the effectiveness of security controls in place.
Mitigation Recommendations
To mitigate Telegram phishing threats, European organizations should implement targeted user education programs emphasizing the risks of unsolicited messages and the importance of verifying sender identities on Telegram. Security teams should monitor Telegram channels and groups relevant to their industry for phishing indicators and report suspicious activity to platform administrators. Enforcing multi-factor authentication (MFA) across all critical systems can reduce the risk of account compromise even if credentials are stolen. Organizations should establish clear policies regarding the use of Telegram for official communications and encourage the use of secure, verified channels. Deploying email and messaging security solutions that can detect and block phishing links or malicious content shared via Telegram is also advisable. Incident response plans should include procedures for handling phishing incidents originating from messaging platforms. Finally, collaboration with national cybersecurity centers and sharing threat intelligence related to Telegram phishing can enhance collective defense.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- ip: 178.20.41.242
- domain: tellandgram.ru
- domain: web.tellandgram.ru
- domain: web.telegpam.ru
- domain: telegpam.ru
- domain: account.telegpam.ru
- domain: org.loginemail.ru
- domain: telegam.org.loginemail.ru
- domain: web.telegam.org.loginemail.ru
- domain: loginemail.ru
- domain: account.loginemail.ru
- domain: account.idloginmail.ru
- domain: yanbex.idloginmail.ru
- domain: mail.yanbex.idloginmail.ru
- domain: idloginmail.ru
- domain: org.idloginmail.ru
- domain: telegra.org.idloginmail.ru
- domain: web.telegra.org.idloginmail.ru
- domain: yanex.ru.authaction.ru
- domain: passport.yanex.ru.authaction.ru
- domain: ru.authaction.ru
- domain: yandex.ru.authaction.ru
- domain: passport.yandex.ru.authaction.ru
- domain: id.vk.authaction.ru
- domain: v2979375.hosted-by-vdsina.ru
- counter: 1
- text: https://www.circl.lu/pdns/
- text: A
- text: 178.20.41.242
- text: web.telegra.org.idloginmail.ru
- datetime: 2025-11-27T06:00:40+00:00
- datetime: 2025-11-27T06:00:40+00:00
- counter: 1
- text: https://www.circl.lu/pdns/
- text: A
- text: 178.20.41.242
- text: web.telegra.org.idloginmail.ru
- datetime: 2025-11-27T06:00:40+00:00
- datetime: 2025-11-27T06:00:40+00:00
- counter: 1
- text: https://www.circl.lu/pdns/
- text: A
- text: 178.20.41.242
- text: web.telegra.org.idloginmail.ru
- datetime: 2025-11-27T06:00:40+00:00
- datetime: 2025-11-27T06:00:40+00:00
- text: Russia
- text: RU
- float: 60
- float: 100
- text: db_source: GeoOpen-Country. build_db: 2025-10-14 11:57:45. Latitude and longitude are country average.
- text: Russia
- text: RU
- float: 60
- float: 100
- text: db_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54. Latitude and longitude are country average.
- text: 48282
- text: ASNOrganization: VDSINA-AS. db_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54.
Telegram phishing and related activities
Description
Telegram phishing and related activities
AI-Powered Analysis
Technical Analysis
The reported threat pertains to phishing activities conducted through the Telegram messaging platform. Phishing, classified under MITRE ATT&CK pattern T1566, involves attackers sending deceptive messages to trick users into revealing sensitive information such as login credentials, financial data, or personally identifiable information. Telegram, a widely used encrypted messaging app, provides a vector for such attacks due to its popularity and the ease of creating channels or groups that can reach large audiences. Unlike software vulnerabilities, this threat exploits human factors rather than technical flaws. Attackers may impersonate trusted contacts or organizations, distribute malicious links, or use fake Telegram bots to harvest credentials. The absence of affected software versions or patches indicates that this is a behavioral threat rather than a technical vulnerability. The medium severity rating reflects the potential damage from successful phishing attempts, including unauthorized access to corporate systems, data breaches, or financial fraud. The threat is persistent and ongoing, as indicated by the 'perpetual' OSINT lifetime tag, and is relevant to network activity monitoring and incident response teams. No known exploits in the wild or automated attack tools have been reported, emphasizing the social engineering nature of the threat.
Potential Impact
For European organizations, the impact of Telegram-based phishing can be significant, particularly for those relying on Telegram for internal communication, customer support, or marketing. Successful phishing attacks can lead to credential compromise, enabling attackers to access corporate networks, exfiltrate sensitive data, or conduct further attacks such as business email compromise or ransomware deployment. The confidentiality of user and organizational data is primarily at risk, with potential secondary impacts on data integrity and system availability if attackers leverage stolen credentials to escalate privileges or disrupt operations. Sectors with high digital engagement, such as finance, technology, and government, are particularly vulnerable. Additionally, the use of Telegram in some European countries is substantial, increasing the attack surface. The threat also poses reputational risks if customers or partners are targeted via phishing campaigns impersonating the organization. Given the social engineering basis, the impact depends heavily on user awareness and the effectiveness of security controls in place.
Mitigation Recommendations
To mitigate Telegram phishing threats, European organizations should implement targeted user education programs emphasizing the risks of unsolicited messages and the importance of verifying sender identities on Telegram. Security teams should monitor Telegram channels and groups relevant to their industry for phishing indicators and report suspicious activity to platform administrators. Enforcing multi-factor authentication (MFA) across all critical systems can reduce the risk of account compromise even if credentials are stolen. Organizations should establish clear policies regarding the use of Telegram for official communications and encourage the use of secure, verified channels. Deploying email and messaging security solutions that can detect and block phishing links or malicious content shared via Telegram is also advisable. Incident response plans should include procedures for handling phishing incidents originating from messaging platforms. Finally, collaboration with national cybersecurity centers and sharing threat intelligence related to Telegram phishing can enhance collective defense.
Affected Countries
Technical Details
- Uuid
- 87e34242-cf13-466b-ad52-6e5feb07be4e
- Original Timestamp
- 1765185910
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip178.20.41.242 | 178.20.41.242: enriched via the circl_passivedns module. |
Domain
| Value | Description | Copy |
|---|---|---|
domaintellandgram.ru | — | |
domainweb.tellandgram.ru | — | |
domainweb.telegpam.ru | — | |
domaintelegpam.ru | — | |
domainaccount.telegpam.ru | — | |
domainorg.loginemail.ru | — | |
domaintelegam.org.loginemail.ru | — | |
domainweb.telegam.org.loginemail.ru | — | |
domainloginemail.ru | — | |
domainaccount.loginemail.ru | — | |
domainaccount.idloginmail.ru | — | |
domainyanbex.idloginmail.ru | — | |
domainmail.yanbex.idloginmail.ru | — | |
domainidloginmail.ru | — | |
domainorg.idloginmail.ru | — | |
domaintelegra.org.idloginmail.ru | — | |
domainweb.telegra.org.idloginmail.ru | — | |
domainyanex.ru.authaction.ru | — | |
domainpassport.yanex.ru.authaction.ru | — | |
domainru.authaction.ru | — | |
domainyandex.ru.authaction.ru | — | |
domainpassport.yandex.ru.authaction.ru | — | |
domainid.vk.authaction.ru | — | |
domainv2979375.hosted-by-vdsina.ru | — |
Counter
| Value | Description | Copy |
|---|---|---|
counter1 | — | |
counter1 | — | |
counter1 | — |
Text
| Value | Description | Copy |
|---|---|---|
texthttps://www.circl.lu/pdns/ | — | |
textA | — | |
text178.20.41.242 | — | |
textweb.telegra.org.idloginmail.ru | — | |
texthttps://www.circl.lu/pdns/ | — | |
textA | — | |
text178.20.41.242 | — | |
textweb.telegra.org.idloginmail.ru | — | |
texthttps://www.circl.lu/pdns/ | — | |
textA | — | |
text178.20.41.242 | — | |
textweb.telegra.org.idloginmail.ru | — | |
textRussia | — | |
textRU | — | |
textdb_source: GeoOpen-Country. build_db: 2025-10-14 11:57:45. Latitude and longitude are country average. | — | |
textRussia | — | |
textRU | — | |
textdb_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54. Latitude and longitude are country average. | — | |
text48282 | — | |
textASNOrganization: VDSINA-AS. db_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54. | — |
Datetime
| Value | Description | Copy |
|---|---|---|
datetime2025-11-27T06:00:40+00:00 | — | |
datetime2025-11-27T06:00:40+00:00 | — | |
datetime2025-11-27T06:00:40+00:00 | — | |
datetime2025-11-27T06:00:40+00:00 | — | |
datetime2025-11-27T06:00:40+00:00 | — | |
datetime2025-11-27T06:00:40+00:00 | — |
Float
| Value | Description | Copy |
|---|---|---|
float60 | — | |
float100 | — | |
float60 | — | |
float100 | — |
Threat ID: 6936d9b6dc63120ed947a35d
Added to database: 12/8/2025, 1:59:18 PM
Last enriched: 1/3/2026, 12:15:09 AM
Last updated: 2/7/2026, 4:50:51 PM
Views: 136
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
KRVTZ-NET IDS alerts for 2026-02-07
LowThreatFox IOCs for 2026-02-06
MediumKRVTZ-NET IDS alerts for 2026-02-06
LowHow to protect yourself from deepfake scammers and save your money | Kaspersky official blog
MediumThreatFox IOCs for 2026-02-05
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.