In this article, I am only going to address the essential information that you need to know. No matter how strong your passwords are, how secure your setup is, there is one vulnerability, that when exploited, nothing beyond that will work. That vulnerability is they exploit is you.
I will expand on this in greater detail and other articles and external source will frequently mention Telegram. The number one ‘hack’, so potent, not even the best protection software prevents
They use social engineering attacks. Coined the “human loophole” to get around and bypass cybersecurity roadblock. Instead of hacking your account using malware or other form of malicious and covert attacks, they hack you by using phishing attacks, imposter frauds and similar scams.
In 2022, Cybercriminals used social engineering techniques in 20% of all data breaches.
However, there are ways to identify Deceptive Indications and Warnings (DWI) or as many will most like understand “False Flags” and I will mention some you need to (this is not optional) to learn and look out for.
Here’s how some of the typical Telegram scams play out:
Telegram bot scams exhibit the typical warning signs of a phishing scam, including:
What to do:
This is perhaps more detailed and not only subject to Telegram. Interpol has released its African Cyberthreat Assessment Report for 2024. The report covers 40 African countries. Interpol estimate an average of a 23% increase in cybercrimes (based on the number of weekly attacks in 2023).
The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data
Interpol African Cyberthreat Assessment 2024 – A summary by MyBroadband
Interpol African Cyberthreat Assessment 2024 [Pdf]
Key takeaways are:
When your account has been breached, specifically if as mentioned as result of social engineering, there is not much you can do since the scammer you unintentionally gave access full access and control over your account to scammers. They have your contact list and the trouble with telegram is that it is one of the few popular messaging apps where no-one can do anything after the fact. What you can do and should do is secure your accounts and inform contacts
The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data
What you can do and should do is secure your accounts and inform contacts
When your account has been breached, specifically if as mentioned as result of social engineering, there is not much you can do since the scammer you unintentionally gave access full access and control over your account to scammers. They have your contact list and the trouble with telegram is that it is one of the few popular messaging apps where no-one can do anything after the fact. What you can do and should do is secure your accounts and inform contacts.
The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data.
Due to the significant increase in terms of cyberthreats and virtual endless ways messaging apps are used by bad actors, the ways these apps are used differs. Telegram is unique in that it lacks the safety features other apps of this variety have enabled by default or have in the first place. Telegram is preferred by bad actors because unlike other popular messaging app using a SIM card is option and they can use stolen numbers (meaning, they get it of dark web marketplaces, even negotiating deals with staff working at telecommunication companies or use virtual numbers.
By default, MFA (Multi-Factor Authentication) is not enabled and this alone is reason not to trust Telegram. In the event you are breached you are on your since not even Telegram employees can help you due to how Telegram works. Telegram have Bot API (API is short for Application Interface and essentially this can be used to impersonate a friend or someone you would trust.
There are ample reasons why you should not use Telegram. Though no application is truly safe and secure, there are those which are more secure but as is often the case end-users take advice from friends, family or people who are not qualified to provide such advice (similar can be said about people who consult their friends for medical advice insofar as their health is concerned and more often than not it does not end well). Below is a list of resources that I have personally curated over time, and as a certified expert not only do I recommend these, I will, if needed refer people to them should the situation warrant it.