Cybercriminals have increasingly turned to blockchain technology and cryptocurrencies in recent years in order to generate quick profits.
Consequently, experts have discovered that malicious actors are now actively using Echelon malware with the auto-download functionality of Telegram, according to a researcher from a leading bug bounty platform for blockchain Immunefi.
Specifically, this malware is a kind of programmed engineering code that has a variety of capabilities to compromise the data and privacy of a user’s computer or mobile device.
The malware can automatically be downloaded
In general, this malware poses an enormous risk to Telegram users who depend on the application’s built-in auto-download feature. Once a file is received, the malware is automatically downloaded to the device without the user’s knowledge.
Following that, victims are not required to run or shut down any apps; the virus will simply be able to access the computer’s footprint and capture screenshots.
The malware file is titled “Smokes night,” and experts have warned that individuals should exercise caution when dealing with this malware since it has the ability to acquire information about non-custodial cryptocurrency wallets as well. On top of this, users are advised that you turn off the auto-download function on your Telegram profile.