🤯 Telegram Scams: $2.1B Fraud Exposed! 🚨

May 03, 2026 |

Tech

🎧 Audio Summaries
English flag
French flag
German flag
Japanese flag
Korean flag
Mandarin flag
Spanish flag
🛒 Shop on Amazon

🧠Quick Intel


  • FEMITBOT platform, utilizing Telegram Mini Apps, is facilitating large-scale fraud including fake cryptocurrency platforms and financial services.
  • Threat actors are impersonating prominent brands, including Apple, Coca-Cola, Disney, eBay, IBM, Moon Pay, NVIDIA, YouKu, and Telegram Mini App, creating convincing app-like experiences.
  • Researchers identified a shared backend with API responses like “Welcome to join the FEMITBOT platform,” launching Mini Apps displaying phishing pages within Telegram’s WebView.
  • Some Mini Apps distribute malware in the form of Android APKs, such as BBC, NVIDIA, CineTV, Coreweave, and Claro, hosting them on the same domain as the API.
  • Tracking scripts, including Meta and TikTok tracking pixels, are utilized to monitor user activity and optimize performance.
  • The FTC reported that Americans lost over $2.1 billion to social media scams in 2025.
  • Police dismantled 9 crypto scam centers, arresting 276 suspects.
  • The Autonomous Validation Summit (May 12 & 14) identified exploitable vulnerabilities.
  • 📝Summary


    Cybersecurity researchers identified a sophisticated fraud operation leveraging Telegram’s Mini App feature, known as FEMITBOT. This platform utilized Telegram bots and embedded Mini Apps to create deceptive app-like experiences, facilitating scams involving fake cryptocurrency platforms and brand impersonations—including Apple, Coca-Cola, and NVIDIA. The operation employed a shared backend, launching phishing pages within Telegram’s WebView, and distributed Android malware disguised as legitimate applications. Following investigations, police dismantled 9 crypto scam centers, arresting 276 suspects. The FTC reported over $2.1 billion in social media scams in 2025, highlighting the ongoing threat of deceptive digital services and the importance of vigilance against fraudulent activities.

    💡Insights



    FEMITBOT: A SCALING CRYPTO SCAM OPERATION WITHIN TELEGRAM MINI APPS
    The cybersecurity research firm, CTM360, has uncovered a sophisticated and widespread fraud operation leveraging Telegram’s Mini App feature. This operation, dubbed FEMITBOT, is primarily focused on facilitating cryptocurrency scams, impersonating reputable brands, and distributing Android malware directly within the Telegram platform. The core of the scheme relies on Telegram bots and embedded Mini Apps to create convincing, app-like experiences, bypassing the need for users to leave the messaging app.

    THE MECHANICS OF THE FEMITBOT PLATFORM
    FEMITBOT’s architecture is built around a shared backend infrastructure utilizing API responses, specifically a “Welcome to join the FEMITBOT platform” string. This centralized approach allows threat actors to rapidly deploy multiple phishing domains and Telegram bots, each utilizing the same underlying technology. When a user interacts with a bot and selects “Start,” a Mini App launches within Telegram’s built-in WebView, presenting a deceptive phishing page. This creates a seamless, app-like experience directly within the familiar Telegram interface.

    SCAM TACTICS AND BRAND IMPERSONATION
    The platform’s versatility is demonstrated through its use in executing various scam types. These include fake cryptocurrency platforms, fraudulent financial services, deceptive AI tools, and simulated streaming sites. A key tactic employed by the attackers is brand impersonation, mimicking well-known companies like Apple, Coca-Cola, Disney, eBay, IBM, Moon Pay, NVIDIA, YouKu, and even a Telegram Mini App impersonating NVIDIA. This strategy increases user trust and engagement, making the scams more convincing.

    PHISHING PAGE DESIGN AND USER ENGAGEMENT
    Once a user interacts with the Mini App, they are presented with dashboards displaying fake balances or “earnings.” These dashboards often incorporate countdown timers and limited-time offers to create a sense of urgency, a common manipulation technique used in investment and advance-fee scams. The goal is to encourage victims to attempt to withdraw their funds, prompting them to make further deposits or complete referral tasks – a classic element of fraudulent investment schemes.

    TRACKING AND OPTIMIZATION
    Adding another layer of sophistication, the FEMITBOT operation employs tracking scripts, including Meta and TikTok tracking pixels, to monitor user activity. This data is then used to measure conversion rates and optimize the performance of the scams. This allows attackers to continually refine their tactics and maximize their effectiveness.

    MALWARE DISTRIBUTION THROUGH ANDROID APKS
    Beyond simple phishing, FEMITBOT has been utilized to distribute malware in the form of Android APK files. These files, mimicking legitimate applications such as the BBC, NVIDIA, CineTV, Coreweave, and Claro, are designed to be downloaded and installed by unsuspecting users. The CTM360 report highlights the careful naming conventions used for these APKs – a mix of recognizable names and random characters – to minimize suspicion.

    TECHNICAL DETAILS AND SECURITY MEASURES
    CTM360 researchers noted that the APKs are hosted on the same domain as the API, ensuring valid TLS certificates and preventing mixed-content warnings. This demonstrates an attempt to bypass standard browser security measures. The operation underscores the importance of user caution, particularly when interacting with Telegram bots promoting crypto investments or requesting the launch of Mini Apps.

    ANDROID APK HOSTING AND TLS VALIDATION
    The operation’s technical sophistication is further highlighted by the use of a shared domain for hosting the Android APKs. This ensures that TLS certificates remain valid, preventing browser warnings and maintaining the illusion of legitimacy. This demonstrates a deliberate effort to circumvent basic security protocols.

    THE ROLE OF TELEGRAM MINI APPS
    Telegram Mini Apps, designed to offer lightweight web applications within the Telegram environment, have become a surprisingly effective tool for cybercriminals. Their ability to create app-like experiences directly within the messaging platform has allowed FEMITBOT to bypass traditional security measures and engage users in a seamless and deceptive manner.

    USER WARNING AND BEST PRACTICES
    Users should exercise extreme caution when interacting with Telegram bots that promote crypto investments or prompt them to launch Mini Apps. The potential for fraud and malware distribution is significant. A key preventative measure is to avoid sideloading APK files, a common method for distributing malicious software outside the official Google Play Store.

    RELATED SECURITY CONCERNS
    The broader cybersecurity landscape is currently facing a surge in exploits, exemplified by Mythos’s chained zero-days that bypassed both renderer and OS sandboxes. This highlights the escalating sophistication of cyberattacks and the need for robust security measures across all platforms. Autonomous Validation Summit discussions and the ongoing threat of new exploits underscore the urgency of proactive security validation and remediation.

    FOOTNOTES
    (This section would contain references to the CTM360 report and other sources cited within the article. As this is a synthesized version, these are omitted for brevity.)