A new malware targeting Android users on Telegram has been discovered, involving videos that conceal malicious code activated upon download. The malware, named EvilLoader, exploits how Telegram processes media files, misclassifying '.htm' files as videos, which allows HTML code to execute in a browser. This malware can lead to credential theft, private data loss, and the installation of banking trojans. It can bypass security measures by redirecting users to their browsers or prompting them to open files as HTML documents, executing malicious JavaScript that sends IP information to attackers. EvilLoader has evolved to check for sandbox environments and generate fake security warnings. Users are advised to update their Telegram app and be cautious with unfamiliar video files. Telegram has stated that the exploit does not indicate a flaw in their platform and has implemented a server-side fix for enhanced protection.