Demo of Telegram Web Account Takeover | Hack Demonstration

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=26Ih4xTcP-E



Duration: 1:00
110,474 views
267


A vulnerability has been discovered in Telegram Web. For more information visit our blog: http://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/

This vulnerability, if exploited, would allow attackers to completely take over users’ accounts on any browser, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more. This means that attackers could potentially download photos and or post them online, send messages on the victim’s behalf, demand ransom, and even take over the victim’s friends’ accounts.

The exploitation of this vulnerability starts with the attacker sending an innocent looking file to the victim, which contains malicious code. The file can be modified to contain attractive content and raise the chances a user will open it. Once the user clicks to open it, the malicious file allows the attacker to access Telegram’s local storage, where user data is stored. From that point, the attacker can gain full access to the user’s account and account data. The attacker can then send the malicious file to the all victim’s contacts, opening a dangerous door to a potentially widespread attack over the Telegram network.

Link to tech details: http://blog.checkpoint.com/wp-content/uploads/2017/03/Technical-Details.docx

Have questions or interested in enterprise endpoint security? Request a demo today.
https://tinyurl.com/yyta5n5s




Other Videos By Check Point Software


2017-05-22What To Do When It Happens to You - Check Point Incident Response
2017-05-22Choosing The Right Security Architecture | Cyber Security | Network Security
2017-05-15Check Point Anti-Ransomware vs WannaCry | Ransomware Protection Demonstration
2017-05-04R80.10 Security Management | Tech Bytes: Gateways, Logs, and Manage & Settings
2017-04-26Advanced Cyber Security for 2018 | Check Point Infinity
2017-04-25CheckMe: FREE and Instant Network Security Assessment | Cyber Security Scan
2017-04-07Check Point and Tufin: Security Management for the Future | Enterprise Network Security
2017-03-29Check Point and Savvius Partnership
2017-03-21Check Point discusses securing web servers with multi-layered security at Google Next 2017
2017-03-15Demo of WhatsApp Web Account Takeover | Hacking Demonstration
2017-03-15Demo of Telegram Web Account Takeover | Hack Demonstration
2017-03-06Check Point & Arista: The Journey to Secure Cloud Networking
2017-03-06Check Point Technical Assistance Center | Network Security Support
2017-03-03Check Point Optimizes Security with Gigamon’s Full Network Visibility
2017-03-02Check Point 2017 Mobile Security Media Tour
2017-03-01Automating Check Point vSEC in OpenStack | Tech Bytes
2017-02-27Check Point 2017 Cyber Security Survey
2017-02-27Check Point vSEC, The Future of Cloud Security
2017-02-21SandBlast Agent Forensics
2017-02-06Anatomy of a Smishing Attack: Czech Posta App
2017-02-02Protecting Mobile Devices Together - ElevenPaths – Telefonica and Check Point | Mobile Security



Tags:
telegram
web account takeover
check point research
check point software
cybercrime
security
threat research
vulnerability
security technology
technology
threat protection
hacking
hackers
demo
cyber protection
cyberattack
threat defense
check point
cyber
attack
malware
malware detection
demonstration
hack demonstration
cyber security
cyber solutions
network solutions
firewall
web security
privacy
web privacy
telegram web
network protection
threat prevention