Sentinel Logo
WANT TO GET HACKED OR SCAMMED? USE TELEGRAM
Sentinel Footer

In this article, I am only going to address the essential information that you need to know. No matter how strong your passwords are, how secure your setup is, there is one vulnerability, that when exploited, nothing beyond that will work. That vulnerability is they exploit is you.

I will expand on this in greater detail and other articles and external source will frequently mention Telegram. The number one ‘hack’, so potent, not even the best protection software prevents

They use social engineering attacks. Coined the “human loophole” to get around and bypass cybersecurity roadblock. Instead of hacking your account using malware or other form of malicious and covert attacks, they hack you by using phishing attacks, imposter frauds and similar scams.

   In 2022, Cybercriminals used social engineering techniques in 20% of all data breaches.

However, there are ways to identify Deceptive Indications and Warnings (DWI) or as many will most like understand “False Flags” and I will mention some you need to (this is not optional) to learn and look out for.

The Taxonomy of Telegram Scams.

Here’s how some of the typical Telegram scams play out:

  • Phishing attacks
    A Telegram user poses as someone you’d otherwise trust (such as a friend, colleague, or a customer support agent) to trick you into giving up your personal information.
  • Off-platform scams
    Someone sends you a link or convinces you to go off the Telegram platform and onto a less-secure site. This site could be used to steal your personal information or even infect your device with malware.
  • ON PREMISES DIAGNOSIS
    Telegram bot attacks. The Telegram platform allows users to create bot accounts, which scammers use to rapidly target vulnerable legitimate accounts. A bot known as X-Files can steal passwords, session cookies, login credentials, and credit card details according to Intel 471 research released in July 2022.
  • Crypto scams
    Telegram has become the go-to platform for people interested in cryptocurrencies and blockchain. Many cybercriminals target Telegram users to get access to their crypto wallets, and transfer out their bitcoin (BTC), Ethereum, and other coins
These are only a few high-level examples of the types of scams you’ll find on Telegram. Even worse, scammers are always finding new ways to commit fraud and steal personal information from unsuspecting Telegram users.
How to spot the scam

Telegram bot scams exhibit the typical warning signs of a phishing scam, including:

  • A false sense of urgency
    Telegram bot scams exhibit the typical warning signs of a phishing scam, including:
  • Spoofed or strange phone numbers
    Look for phone numbers that don’t seem right or don’t match the company’s official number.
  • Grammatical and spelling errors
    Scammers and bots won’t communicate the same way that a customer support representative will.
  • Requests for sensitive information
    They’ll ask you to provide account details, 2FA codes, or passwords to “verify” your identity.

What to do:

  • Phishing attacks
    If you get an unsolicited phone call from someone claiming to be from your bank (or other organization), hang up and call back using their official number. Don’t trust your caller ID, either, as scammers can spoof or disguise their number to look like it’s coming from someone else.
  • Off-platform scams
    Remember: a company will never reach out to you over Telegram or any other third-party messaging platform.
  • Spoofed or strange phone numbers
    Grammatical and spelling errors. Scammers and bots won’t communicate the same way that a customer support representative will.
  • Requests for sensitive information
    They’ll ask you to provide account details, 2FA codes, or passwords to “verify” your identity.
Cyberthreat Assessment – South Africa 2024

This is perhaps more detailed and not only subject to Telegram. Interpol has released its African Cyberthreat Assessment Report for 2024. The report covers 40 African countries. Interpol estimate an average of a 23% increase in cybercrimes (based on the number of weekly attacks in 2023).

The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data

   Interpol African Cyberthreat Assessment 2024 – A summary by MyBroadband

   Interpol African Cyberthreat Assessment 2024 [Pdf]

Key takeaways are:

  • Ransom paid by companies (2023) on average was R 17.9 million.
  • Globally the weekly average was 1 out 31 people who experience ransomware attacks in 2023.
  • Ransomware became a trend in 2023 and emerged as one of Africa’s most serious cyber threats as attackers have started changing their modus operandi
Conclusion

When your account has been breached, specifically if as mentioned as result of social engineering, there is not much you can do since the scammer you unintentionally gave access full access and control over your account to scammers. They have your contact list and the trouble with telegram is that it is one of the few popular messaging apps where no-one can do anything after the fact. What you can do and should do is secure your accounts and inform contacts

The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data

What you can do and should do is secure your accounts and inform contacts

  • First thing you want to do is inform all people in your contact list that if they receive a message, it is not from you. You do this for your own safety. That if they receive message that is not of the variety you sent out normally that they should ask you.
  • Report breach to all authorities, your mobile provider, regulators and authorities. They may or may not respond but at the very least you have reported the breach
  • Secure your devices by using tools that are designed to prevent this from happening again, some good modern examples designed for this is Aura and Guardio.
  • Enable 2-FA, MFA authentication on the apps and services you use. Telegram as mentioned do not have this enabled by default.
  • You maybe get messages from contacts after the fact and it will persist for some time, but usually it clears up, if not the only other option that remains is changing your mobile number but even then, that stops nobody from impersonating you so it is not as effective as many think.
  • Do not interact with impersonators and ask your contacts to block them. They have your real number and should be able know whether you sent it or not.

When your account has been breached, specifically if as mentioned as result of social engineering, there is not much you can do since the scammer you unintentionally gave access full access and control over your account to scammers. They have your contact list and the trouble with telegram is that it is one of the few popular messaging apps where no-one can do anything after the fact. What you can do and should do is secure your accounts and inform contacts.

The report shows how ransomware, catfishing, and sextortion scams have emerged as significant threats to African individuals and organizations. The report mentions the various types of cyberthreats, malware, the increased use of Artificial Intelligence (AI) and increased sophistication. The report goes into detail on all of this. However as for myself, since it is by far the most dangerous attack is malware based attacked since THE ONLY options you have when you are “ransomwared” is to pay the fees the hackers request or start from scratch and whether you pay or not there is no guarantee they will not leak your data.

Resources, Sources and References

Due to the significant increase in terms of cyberthreats and virtual endless ways messaging apps are used by bad actors, the ways these apps are used differs. Telegram is unique in that it lacks the safety features other apps of this variety have enabled by default or have in the first place. Telegram is preferred by bad actors because unlike other popular messaging app using a SIM card is option and they can use stolen numbers (meaning, they get it of dark web marketplaces, even negotiating deals with staff working at telecommunication companies or use virtual numbers.

By default, MFA (Multi-Factor Authentication) is not enabled and this alone is reason not to trust Telegram. In the event you are breached you are on your since not even Telegram employees can help you due to how Telegram works. Telegram have Bot API (API is short for Application Interface and essentially this can be used to impersonate a friend or someone you would trust.

There are ample reasons why you should not use Telegram. Though no application is truly safe and secure, there are those which are more secure but as is often the case end-users take advice from friends, family or people who are not qualified to provide such advice (similar can be said about people who consult their friends for medical advice insofar as their health is concerned and more often than not it does not end well). Below is a list of resources that I have personally curated over time, and as a certified expert not only do I recommend these, I will, if needed refer people to them should the situation warrant it.