Hackers Use Pastebin-Hosted PowerShell Script to Steal Telegram Sessions
A new threat has emerged where hackers are using a script hosted on Pastebin to steal Telegram sessions, potentially compromising user accounts and sensitive information. The malicious PowerShell script targets Windows systems and leverages the Telegram API to extract session data.
How It Works
The attackers have uploaded a PowerShell script to Pastebin which, when executed, performs the following actions:
- Telegram Session Extraction: The script retrieves session cookies from the
%appdata%\telegram-desktopdirectory. - Session Data Upload: Once obtained, the stolen Telegram sessions are sent to an attacker-controlled server.
Potential Impact
- Compromised Accounts: Hackers can use the stolen sessions to impersonate victims and gain unauthorized access to their Telegram accounts.
- Data Exposure: Any sensitive information shared through Telegram could be exposed if session data is compromised.
- Unauthorized Activity: Malicious actors may send messages, change settings, or engage in other activities on behalf of affected users.
Immediate Actions
To mitigate the risk and protect your account:
- Terminate Sessions:
- Open Telegram application Settings.
- Navigate to Privacy and Security > Active Sessions.
Read the full article at Cyber Security News
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.





