Threat intelligence

Threat Actors Caught Using Telegram Bot to Harvest Credentials

by Security News

This week, the SonicWall Capture Labs threat research team performed an analysis of a phishing email that included an HTML file attachment, which contained code to capture user credentials and post them to a Telegram bot via Telegram API.

Telegram Bots

A Telegram bot is a program that acts like a user on the Telegram messaging platform, allowing it to automate tasks and interact with users. Phishing campaigns have been using Telegram bots for a long time, as you can see from the graph below. We observe that there are multiple threat actors who are using this approach based on the bot token identified in the campaigns, which is unique to each bot.

graphssss.PNG
Figure 1: Number of samples using Telegram Bot since December 2024

A couple of Telegram Bot usernames that we observed are:

1. Blessed2bBot [ 7881075081:[removed]RCsM4epHCCGpuXaV1GLgA ]

2. Anto_Arabbot [7537043387: [removed]-7E1rplQOK8-zEQ3wKsLpERnA]

3. Godcantfail_bot [ 7450777719: [removed]XLifA0Euuv0ugyUwr5dZUo]

Infection Cycle

The malicious file is sent as an attachment in a spam email, disguised as a delivery document and is named as ‘DELIVERY-doc#7632.html’.

On opening the sample, it shows a blurred PDF document with a pop-up asking for user credentials to view the document, as shown below:

image1.PNG
Figure 2: The Sample is shown as a masked PDF file

Once the credentials are entered, those details, along with the public IP information (gathered using api.ipify.org), will be posted to a Telegram Bot using the Telegram API as shown below:

image2.png
Figure 3: Informing the user that credentials are not valid

The embedded JavaScript shows that the entered credentials are invalid three times, and on fourth time, it redirects to the home page of the domain belonging to the user's email.

Image3.png
Figure 4: Sample code redirecting to the home page of the domain

“Blessed2bBot”

The sample that we discussed above is using the Telegram bot named “Blessed logs”, and the Telegram username is “Blessed2bBot”.

Based on the details available, we have even retrieved the possible messages from the Telegram chat and observed that the same bot is used in multiple campaigns. This bot has been active since February 2025.

The sample discussed above is using “====Nelly Pdf LogZ====” as an identifier, but when the chat messages are retrieved from the Telegram chat, we observed that the same bot had the following identifiers as well, which may suggest that multiple threat actors/multiple campaigns are sharing this bot.

Campaign Identifiers

• --------[SKYCEE_LOGZ]----------

• ===== Document O365 Logins =======

• ===== Business NETVIGATOR Logins =======

In the chat feed we retrieved, we could observe 264 unique email IDs belonging to different domains along with their passwords. The repetition of email addresses might be due to the user entering the combination more than once due to the displayed error message.

Some of the email addresses are related to public email domains like Outlook, Hotmail, and Gmail, and the rest are private organizations.

We strongly advise our users to remain alert and cautious regarding any unsolicited emails and to refrain from sharing personal information, especially if the source is uncertain.

This threat was detected by SonicWall Capture ATP w/RTDMI.

image4.png
Figure 5: Capture report for the analysed sample

IOCs

Network:

• hxxps://api[.]telegram[.]org/bot<>/SendMessage?chat_id=<>&text=<>

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • CraftCMS Vulnerability Exposes Systems to Pre-Auth RCE, Now Exploited in the Wild (CVE-2025-32432)
    Read More
  • NetSupport RAT Malware Spied in Ukraine
    Read More