#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

26 C
Dubai
Tuesday, February 10, 2026
HomeTopics 1Authentication SystemsRe-Emerging Telegram Phishing Campaign Hijacks User Authorization Prompts

Re-Emerging Telegram Phishing Campaign Hijacks User Authorization Prompts

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

Attackers are abusing Telegram’s own login and authorization workflows to take over accounts no malware, no exploits, just user approval.

A newly resurfaced phishing campaign targeting Telegram users is raising fresh alarms among security teams worldwide. Unlike traditional phishing attacks that steal passwords or session tokens, this operation takes a more insidious route: it abuses Telegram’s legitimate authentication and in-app authorization prompts to gain full control of user accounts.

According to new research published by CYFIRMA and shared in its detailed threat analysis, the campaign is active, scalable, and globally oriented, making it particularly dangerous for individuals, businesses, and organizations that rely on Telegram for communication, coordination, and even operational workflows.
(Source: CYFIRMA research report, linked source embedded)

How the attack works

CYFIRMA’s investigation shows that attackers are no longer trying to “break” Telegram. Instead, they are convincing users to let them in.

The campaign relies on attacker-controlled Telegram API credentials that integrate directly with Telegram’s official login infrastructure. Victims are lured to phishing pages that look convincingly legitimate and are offered two main login paths:

1. QR-code login flow
Victims are instructed to scan a Telegram-style QR code using their mobile app. This action triggers a real Telegram login request, followed by an in-app authorization prompt asking the user to confirm the session.

2. Manual login flow
Victims enter their phone number, one-time code, and – if enabled – their two-step verification password. Again, Telegram sends a legitimate authorization request inside the app.

In both cases, the decisive moment happens inside Telegram itself, where users are prompted to tap “This is me” or “Yes.” Once approved, attackers immediately gain a fully authorized session, without malware, exploits, or suspicious technical artifacts.

To lower suspicion, the phishing pages reinforce the process with misleading messages such as “security verification” or “unusual activity detected,” framing the approval as routine and urgent.

Why this campaign is harder to detect

What makes this operation particularly effective is its abuse of trusted platform features:

  • The login and authorization prompts are genuine
  • Network traffic blends into normal Telegram activity
  • No malicious files or exploits are used
  • Traditional endpoint security tools see little to flag

CYFIRMA’s analysis also reveals a centrally managed, configuration-driven infrastructure. Attackers can rapidly rotate domains, reuse the same backend logic, and deploy multilingual phishing pages – including fully localized Simplified Chinese (zh-CN) interfaces – suggesting intentional global reach.

This aligns with a broader trend security professionals are seeing across platforms: attackers increasingly prefer “abuse of function” over technical exploitation.

The wider impact on users and organizations

Once compromised, Telegram accounts are often weaponized quickly. Attackers use them as secondary delivery channels, sending phishing links directly to trusted contacts, groups, and communities—dramatically increasing success rates.

For organizations, this can lead to:

  • Internal account takeovers
  • Leakage of sensitive conversations
  • Impersonation of executives or administrators
  • Lateral phishing campaigns inside trusted networks

This is especially relevant for sectors that rely heavily on Telegram, including media, fintech, crypto communities, activists, and businesses operating in high-risk regions.

From a defensive standpoint, this campaign highlights why cybersecurity governance and awareness, such as the services delivered by Saintynet Cybersecurity, are becoming as critical as technical controls alone.

MEA perspective (why it matters regionally)

Telegram is widely used across the Middle East and Africa (MEA) for business communications, community coordination, and government-adjacent activities. The region’s rapid digital adoption – combined with high mobile usage – makes social-engineering-driven attacks particularly effective.

Security leaders in MEA organizations should treat this campaign as a warning: trusted platforms are no longer safe by default when attackers can manipulate user behavior instead of infrastructure.

10 recommended actions for security teams and users

  1. Approve authorization prompts only if you initiated them
    Unexpected Telegram login approvals should always be treated as suspicious.
  2. Avoid logging in via links
    Access Telegram only through the official app or website never via message links.
  3. Review active sessions regularly
    Check Telegram’s security settings and terminate unknown devices immediately.
  4. Enable and protect two-step verification
    Use a strong, unique password and never enter it outside official interfaces.
  5. Educate users continuously
    Ongoing training and awareness programs are essential.
  6. Assume trusted contacts can be compromised
    Verify unusual requests through a separate channel before responding.
  7. Monitor for impersonation and lateral phishing
    Watch for abnormal messaging behavior from known accounts.
  8. Encourage rapid incident response
    If a user approves a suspicious prompt, revoke sessions and reset credentials immediately.
  9. Update threat models
    Account takeover via legitimate features should be factored into risk assessments.
  10. Share intelligence across teams
    Publishing and consuming threat insights – like those on cybercory.com – helps organizations stay ahead of evolving campaigns.

Conclusion

This re-emerging Telegram phishing campaign is not new—but it is more refined, more scalable, and more dangerous. By abusing legitimate authentication workflows and relying on user approval rather than exploits, attackers are blurring the line between normal behavior and compromise.

The takeaway is clear: security can no longer rely on technology alone. Strong governance, user awareness, and proactive cyber defense strategies are now the front line. As attackers continue to weaponize trust itself, organizations that invest early in resilience will be the ones best prepared for what comes next.

Re-Emerging Telegram Phishing Campaign Hijacks User Authorization Prompts

Subtitle:
Attackers are abusing Telegram’s own login and authorization workflows to take over accounts no malware, no exploits, just user approval.

What happened and why it matters

A newly resurfaced phishing campaign targeting Telegram users is raising fresh alarms among security teams worldwide. Unlike traditional phishing attacks that steal passwords or session tokens, this operation takes a more insidious route: it abuses Telegram’s legitimate authentication and in-app authorization prompts to gain full control of user accounts.

According to new research published by CYFIRMA and shared in its detailed threat analysis, the campaign is active, scalable, and globally oriented, making it particularly dangerous for individuals, businesses, and organizations that rely on Telegram for communication, coordination, and even operational workflows.
(Source: CYFIRMA research report, linked source embedded)

How the attack works

CYFIRMA’s investigation shows that attackers are no longer trying to “break” Telegram. Instead, they are convincing users to let them in.

The campaign relies on attacker-controlled Telegram API credentials that integrate directly with Telegram’s official login infrastructure. Victims are lured to phishing pages that look convincingly legitimate and are offered two main login paths:

1. QR-code login flow
Victims are instructed to scan a Telegram-style QR code using their mobile app. This action triggers a real Telegram login request, followed by an in-app authorization prompt asking the user to confirm the session.

2. Manual login flow
Victims enter their phone number, one-time code, and – if enabled – their two-step verification password. Again, Telegram sends a legitimate authorization request inside the app.

In both cases, the decisive moment happens inside Telegram itself, where users are prompted to tap “This is me” or “Yes.” Once approved, attackers immediately gain a fully authorized session, without malware, exploits, or suspicious technical artifacts.

To lower suspicion, the phishing pages reinforce the process with misleading messages such as “security verification” or “unusual activity detected,” framing the approval as routine and urgent.

Why this campaign is harder to detect

What makes this operation particularly effective is its abuse of trusted platform features:

  • The login and authorization prompts are genuine
  • Network traffic blends into normal Telegram activity
  • No malicious files or exploits are used
  • Traditional endpoint security tools see little to flag

CYFIRMA’s analysis also reveals a centrally managed, configuration-driven infrastructure. Attackers can rapidly rotate domains, reuse the same backend logic, and deploy multilingual phishing pages – including fully localized Simplified Chinese (zh-CN) interfaces – suggesting intentional global reach.

This aligns with a broader trend security professionals are seeing across platforms: attackers increasingly prefer “abuse of function” over technical exploitation.

The wider impact on users and organizations

Once compromised, Telegram accounts are often weaponized quickly. Attackers use them as secondary delivery channels, sending phishing links directly to trusted contacts, groups, and communities—dramatically increasing success rates.

For organizations, this can lead to:

  • Internal account takeovers
  • Leakage of sensitive conversations
  • Impersonation of executives or administrators
  • Lateral phishing campaigns inside trusted networks

This is especially relevant for sectors that rely heavily on Telegram, including media, fintech, crypto communities, activists, and businesses operating in high-risk regions.

From a defensive standpoint, this campaign highlights why cybersecurity governance and awareness, such as the services delivered by Saintynet Cybersecurity, are becoming as critical as technical controls alone.

MEA perspective (why it matters regionally)

Telegram is widely used across the Middle East and Africa (MEA) for business communications, community coordination, and government-adjacent activities. The region’s rapid digital adoption—combined with high mobile usage—makes social-engineering-driven attacks particularly effective.

Security leaders in MEA organizations should treat this campaign as a warning: trusted platforms are no longer safe by default when attackers can manipulate user behavior instead of infrastructure.

10 recommended actions for security teams and users

  1. Approve authorization prompts only if you initiated them
    Unexpected Telegram login approvals should always be treated as suspicious.
  2. Avoid logging in via links
    Access Telegram only through the official app or website—never via message links.
  3. Review active sessions regularly
    Check Telegram’s security settings and terminate unknown devices immediately.
  4. Enable and protect two-step verification
    Use a strong, unique password and never enter it outside official interfaces.
  5. Educate users continuously
    Ongoing training and awareness programs—such as those offered via saintynet.com—are essential.
  6. Assume trusted contacts can be compromised
    Verify unusual requests through a separate channel before responding.
  7. Monitor for impersonation and lateral phishing
    Watch for abnormal messaging behavior from known accounts.
  8. Encourage rapid incident response
    If a user approves a suspicious prompt, revoke sessions and reset credentials immediately.
  9. Update threat models
    Account takeover via legitimate features should be factored into risk assessments.
  10. Share intelligence across teams
    Publishing and consuming threat insights—like those on cybercory.com—helps organizations stay ahead of evolving campaigns.

Conclusion

This re-emerging Telegram phishing campaign is not new, but it is more refined, more scalable, and more dangerous. By abusing legitimate authentication workflows and relying on user approval rather than exploits, attackers are blurring the line between normal behavior and compromise.

The takeaway is clear: security can no longer rely on technology alone. Strong governance, user awareness, and proactive cyber defense strategies are now the front line. As attackers continue to weaponize trust itself, organizations that invest early in resilience will be the ones best prepared for what comes next.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img