
Fake Telegram Site Delivers Multi-Stage Malware Using In-Memory Execution
Cybersecurity researchers have identified a malicious campaign that spreads malware through a fake Telegram download website. The site, hosted on the typosquatted domain telegram [.]com, impersonates the official Telegram download portal and tricks users into installing a malicious installer disguised as legitimate software. The website closely resembles Telegram’s official page and encourages users to download […] The post Fake Telegram Site Delivers Multi-Stage Malware Using In-Memory Execution appeared first on Cyber Security News.