We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Android Malware Spreads via Fake Telegram Premium App

Android Malware Spreads via Fake Telegram Premium App
Anka Markovic Borak Published on 10th January 2025 Writer and Quality Assessor

An emerging Android malware, FireScam, is posing as a premium version of Telegram and spreading via phishing websites imitating RuStore, Russia's alternative app marketplace. Researchers at Cyfirma revealed the malware uses advanced techniques to steal user data.

FireScam is distributed through a fake GitHub-hosted RuStore page. RuStore was launched in May 2022 by VK with the Russian Ministry of Digital Development’s backing. It was developed as an alternative to Western app stores like Google Play and the Apple App Store.

The fake page delivers a dropper named GetAppsRu.apk, which uses DexGuard obfuscation to bypass detection and gain critical permissions. These permissions allow it to identify installed apps, access device storage, and install additional malware. Once the device is compromised, it downloads and installs the primary malware payload, Telegram Premium.apk.

Upon opening this app, the malware requests access to sensitive data such as notifications, clipboard, SMS, and telephony services. FireScam also begins to track screen activity and monitors e-commerce transactions.

The malware then initiates communication with a Firebase Realtime Database, temporarily storing stolen data before it’s exfiltrated to an unknown location. Using unique device identifiers, FireScam tracks compromised devices in real time.

Additionally, the malware maintains a WebSocket connection to a Firebase command-and-control server, giving the threat actors the ability to efficiently and stealthily extract data, give remote commands, and install additional payloads.

In recent and relevant news, it was discovered that an Android malware under the name of NGate had been stealing NFC (Near Field Communication) data with the aim of replicating payment cards and extracting funds from ATMs.

To minimize the risk of this threat, experts recommend that users avoid downloading apps from unverified sources and exercise caution when opening unfamiliar files or links.

About the Author

Anka Markovic-Borak is a writer and quality assessor at vpnMentor, who leverages her expertise to write insightful articles on cybersecurity, driven by her passion for protecting online privacy. She also ensures articles written by others are reaching vpnMentor's high standards.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address