Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Telegram phishing and related activities

0
Medium
Published: Mon Dec 08 2025 (12/08/2025, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

Telegram phishing and related activities

AI-Powered Analysis

AILast updated: 01/03/2026, 00:15:09 UTC

Technical Analysis

The reported threat pertains to phishing activities conducted through the Telegram messaging platform. Phishing, classified under MITRE ATT&CK pattern T1566, involves attackers sending deceptive messages to trick users into revealing sensitive information such as login credentials, financial data, or personally identifiable information. Telegram, a widely used encrypted messaging app, provides a vector for such attacks due to its popularity and the ease of creating channels or groups that can reach large audiences. Unlike software vulnerabilities, this threat exploits human factors rather than technical flaws. Attackers may impersonate trusted contacts or organizations, distribute malicious links, or use fake Telegram bots to harvest credentials. The absence of affected software versions or patches indicates that this is a behavioral threat rather than a technical vulnerability. The medium severity rating reflects the potential damage from successful phishing attempts, including unauthorized access to corporate systems, data breaches, or financial fraud. The threat is persistent and ongoing, as indicated by the 'perpetual' OSINT lifetime tag, and is relevant to network activity monitoring and incident response teams. No known exploits in the wild or automated attack tools have been reported, emphasizing the social engineering nature of the threat.

Potential Impact

For European organizations, the impact of Telegram-based phishing can be significant, particularly for those relying on Telegram for internal communication, customer support, or marketing. Successful phishing attacks can lead to credential compromise, enabling attackers to access corporate networks, exfiltrate sensitive data, or conduct further attacks such as business email compromise or ransomware deployment. The confidentiality of user and organizational data is primarily at risk, with potential secondary impacts on data integrity and system availability if attackers leverage stolen credentials to escalate privileges or disrupt operations. Sectors with high digital engagement, such as finance, technology, and government, are particularly vulnerable. Additionally, the use of Telegram in some European countries is substantial, increasing the attack surface. The threat also poses reputational risks if customers or partners are targeted via phishing campaigns impersonating the organization. Given the social engineering basis, the impact depends heavily on user awareness and the effectiveness of security controls in place.

Mitigation Recommendations

To mitigate Telegram phishing threats, European organizations should implement targeted user education programs emphasizing the risks of unsolicited messages and the importance of verifying sender identities on Telegram. Security teams should monitor Telegram channels and groups relevant to their industry for phishing indicators and report suspicious activity to platform administrators. Enforcing multi-factor authentication (MFA) across all critical systems can reduce the risk of account compromise even if credentials are stolen. Organizations should establish clear policies regarding the use of Telegram for official communications and encourage the use of secure, verified channels. Deploying email and messaging security solutions that can detect and block phishing links or malicious content shared via Telegram is also advisable. Incident response plans should include procedures for handling phishing incidents originating from messaging platforms. Finally, collaboration with national cybersecurity centers and sharing threat intelligence related to Telegram phishing can enhance collective defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Uuid
87e34242-cf13-466b-ad52-6e5feb07be4e
Original Timestamp
1765185910

Indicators of Compromise

Ip

ValueDescriptionCopy
ip178.20.41.242
178.20.41.242: enriched via the circl_passivedns module.

Domain

ValueDescriptionCopy
domaintellandgram.ru
domainweb.tellandgram.ru
domainweb.telegpam.ru
domaintelegpam.ru
domainaccount.telegpam.ru
domainorg.loginemail.ru
domaintelegam.org.loginemail.ru
domainweb.telegam.org.loginemail.ru
domainloginemail.ru
domainaccount.loginemail.ru
domainaccount.idloginmail.ru
domainyanbex.idloginmail.ru
domainmail.yanbex.idloginmail.ru
domainidloginmail.ru
domainorg.idloginmail.ru
domaintelegra.org.idloginmail.ru
domainweb.telegra.org.idloginmail.ru
domainyanex.ru.authaction.ru
domainpassport.yanex.ru.authaction.ru
domainru.authaction.ru
domainyandex.ru.authaction.ru
domainpassport.yandex.ru.authaction.ru
domainid.vk.authaction.ru
domainv2979375.hosted-by-vdsina.ru

Counter

ValueDescriptionCopy
counter1
counter1
counter1

Text

ValueDescriptionCopy
texthttps://www.circl.lu/pdns/
textA
text178.20.41.242
textweb.telegra.org.idloginmail.ru
texthttps://www.circl.lu/pdns/
textA
text178.20.41.242
textweb.telegra.org.idloginmail.ru
texthttps://www.circl.lu/pdns/
textA
text178.20.41.242
textweb.telegra.org.idloginmail.ru
textRussia
textRU
textdb_source: GeoOpen-Country. build_db: 2025-10-14 11:57:45. Latitude and longitude are country average.
textRussia
textRU
textdb_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54. Latitude and longitude are country average.
text48282
textASNOrganization: VDSINA-AS. db_source: GeoOpen-Country-ASN. build_db: 2025-10-14 12:06:54.

Datetime

ValueDescriptionCopy
datetime2025-11-27T06:00:40+00:00
datetime2025-11-27T06:00:40+00:00
datetime2025-11-27T06:00:40+00:00
datetime2025-11-27T06:00:40+00:00
datetime2025-11-27T06:00:40+00:00
datetime2025-11-27T06:00:40+00:00

Float

ValueDescriptionCopy
float60
float100
float60
float100

Threat ID: 6936d9b6dc63120ed947a35d

Added to database: 12/8/2025, 1:59:18 PM

Last enriched: 1/3/2026, 12:15:09 AM

Last updated: 2/5/2026, 7:46:30 AM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats