Telegram Phishing Simulation Tool Workflow

Telegram Phishing Simulation Tool Workflow

Steps to Run a Telegram Campaign 

When planning a Telegram phishing simulation, follow these structured steps to ensure smooth execution and compliance:


Configure the Template in TSAT

1. Log in to TSAT

Access your account on the TSAT platform.

2. Navigate to Templates

Go to the Templates section and click on "Create Template".


3. Provide Template Details

Fill in the following fields:

  • Template Name: Assign a name for easy identification.

  • Category: Choose the appropriate category for the campaign.

  • Language: Set the language based on the audience.

  • Simulation Type: Select "Simulation Attack".

  • Attack Vector: Choose "Telegram".

  • Credential Harvesting:
    Enable or disable the Credential Harvesting checkbox depending on whether the campaign will collect user credentials.


4. Attacker Profile Configuration

  • Add the Sender Phone Number (a valid number that can be used to send messages via Telegram).

  • The number must be verified via OTP as part of the attacker profile setup.

OTP Delivery Logic:

  1. If the number is registered on Telegram
    The OTP will be delivered via Telegram chat.

Note: Ensure that Two-Factor Authentication (2FA) is disabled on the number to receive the OTP on Telegram.

  1. If the number is not registered on Telegram
    The OTP will be delivered via SMS.





5. Message Template Configuration

  • Enter the customised phishing message.

  • Use variables to personalise the message:

    • First Name: {{.fname}}

    • Last Name: {{.lname}}

    • URL: {{.URL}}

  • Upload an image, if required, to enhance the message.





6. Landing Page Configuration

  • If Credential Harvesting is enabled:

    • Configure the landing page according to customer requirements.

    • Select appropriate checkboxes for:

      • Data collection fields

      • Awareness page redirection (if applicable)


7. Finalize the Template

  • Click on "Go to Next" to preview the template.

  • Review all configurations.

  • Click "Finish" to save the template.


Run a Campaign with the Template

1. Select the Template

  • Open the newly created Telegram template.

2. Create a Campaign

  • Click on "Create Campaign".

3. Enter Campaign Details

  • Assign a Campaign Name.

  • Select the Target User Group.

  • Set the Campaign Expiry Date.

4. Deploy the Campaign

  • Click "Send Now" to launch the campaign to the selected user group.


 Note:

Telegram-based phishing simulations will only work if the user has the Telegram app installed and accessible on their mobile device.

If the app is not installed or accessible, the user will not receive the message, and the simulation will not be delivered.


This process ensures accurate configuration and execution of the Telegram phishing simulation, enabling effective testing while aligning with customer requirements. If you need any further assistance or clarification, feel free to reach out!


    • Related Articles

    • How to create Phishing Campaign Flow in TSAT?

      Please follow the below steps to create a Phishing Template Step 1 : Click on Campaign Templates" on left side menu and then click on "Create New" as shown in the below screenshot. Step 2 : Input the below details in the opened form after clicking on ...
    • How To Edit Campaign Templates in ThreatCop?

      TSAT offers a range of features, including the ability to edit existing templates. This article will guide you through the process. To edit a template, ensure it is categorized under "Custom Templates," as only custom templates can be edited. If you ...
    • What are Campaign Templates?

      ThreatCop allows you to simulate customizable dummy cyber attack campaigns on your employees to assess their vulnerability level and your organization’s threat posture. It offers a wide range of campaign templates to make this task easier. A campaign ...
    • How do filter work in Campaign Template

      Accessing Campaign Templates: Login: Begin by logging in to your TSAT account. Template Selection: Under the main menu on the left-hand side, you'll find the "Campaign Templates" option. Filtering for the Perfect Template: Filtering email templates ...
    • Creating a Phishing Simulation Rule in the Microsoft Defender

      In order to whitelist Threatcop into your O365 environment you need to follow the below mentioned steps: Go to https://www.microsoft365.com/ Locate the square with dots positioned at the upper-left corner. Proceed to access the Security section ...