Qwizzserial Craze: How Telegram Scammers Sidestepped Security to Swipe $62K

Qwizzserial: The SMS-stealing malware spreading faster than gossip in a small town is infecting Android devices via Telegram in Uzbekistan. Scammers pose as government officials offering financial aid, but instead of help, users get a malware-laden APK. Remember, if it sounds too good to be true, it’s probably malware.

Pro Dashboard

Hot Take:

Uzbekistan’s digital underworld just got a new villain, and it’s not a Bond movie. Meet Qwizzserial, the malware that’s making SMS as secure as a wet paper bag. If you thought Telegram was just for gossiping with friends, think again—it’s now a launchpad for cybercriminals with a penchant for government cosplay.

Key Points:

  • Qwizzserial malware, part of Ajina malware family, targets SMS-based authentication in Uzbekistan.
  • Distributed via Telegram with fake government aid apps, luring users into installing malware.
  • Steals sensitive information like phone numbers, banking app details, and SMS data.
  • Campaign mimics Classiscam model, netting perpetrators at least $62,000 in a few months.
  • Group-IB recommends vigilance against unofficial apps and enhanced security measures.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?