Tech

Telegram Mini Apps victimized by crypto scams, Android malware delivery

Cybersecurity researchers have discovered a major scam that uses Telegram’s Mini App feature to run crypto scams, impersonate well-known brands, and spread Android malware.

A new CTM360 report says the platform, called FEMITBOT, is based on a series of strings found in API responses and uses Telegram bots and embedded Mini Apps to create a compelling, app-like experience right inside the messaging environment.

Telegram Mini Apps are lightweight web applications that run within Telegram’s built-in browser, enabling services such as payments, account access, and interactive tools without requiring users to leave the application.

Abusing Telegram’s micro-apps

According to a CTM360 report shared with BleepingComputer, the FEMITBOT platform is used to commit many types of fraud, including fake cryptocurrency platforms, financial services, AI tools, and streaming sites.

In various campaigns, threat actors have created widely known products to increase credibility and engagement, while using the same backend infrastructure with different domains and Telegram bots.

Some of the brands that have not been involved in this campaign include Apple, Coca-Cola, Disney, eBay, IBM, Moon Pay, NVIDIA, YouKu,

Telegram Mini App impersonates NVIDIA
Telegram Mini App impersonates NVIDIA
Source: CTM360

The researchers say the activity uses a shared backend, where multiple phishing domains use the same API response, “Welcome to join the FEMITBOT platform,” indicating that they all use the same infrastructure.

API response received from FEMITBOT campaigns
API response received from FEMITBOT campaigns
Source: CTM360

The service uses Telegraph bots to display phishing sites directly within the social network. When a user interacts with the bot and clicks “Start,” the bot launches a Mini App that displays the phishing page in Telegram’s built-in WebView, making it appear as part of the app itself.

Once inside, victims are shown dashboards with fake balances or “earnings,” often paired with countdown timers or limited-time offers to create a sense of urgency.

When users try to withdraw funds, they are instructed to make a deposit or complete a transfer transaction, a common tactic in investment and cash advance scams.

Researchers say the infrastructure is designed to be used across different campaigns, allowing attackers to easily change logos, languages, and themes.

Campaigns also use tracking scripts, such as Meta and TikTok tracking pixels, to track user activity, measure conversions, and potentially improve performance.

Other Small Apps have also tried to distribute malware in the form of Android APKs imitating brands such as BBC, NVIDIA, CineTV, Coreweave, and Claro.

Some Android APKs are pushed by FEMITBOT
Some Android APKs are pushed by FEMITBOT
Source: CTM360

Users are instructed to download Android APK files, open links within the in-app browser, or install persistent web apps that emulate official software.

“APK file names are carefully chosen to resemble legitimate applications or use random-looking names that do not immediately arouse suspicion,” CTM360 explained.

“APKs are hosted in the same domain as the API, which ensures the validity of the TLS certificate and avoids mixed content warnings in the browser.”

Users should be careful when interacting with Telegraph bots that promote crypto investments or tell them to launch Micro Apps, especially if they are asked to deposit money or download apps.

As a general rule, Android users should avoid sideloading APK files, which are often used to distribute malware outside of the Google Play Store.

header image

AI has tied four zero days to a single exploit that bypasses both renderer and OS sandboxes. A wave of new exploits is coming.

At the Automated Validation Conference (May 12 & 14), see how autonomous, context-rich validation finds usability, validates controls, and closes the correction loop.

Find Your Place

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button