Mobile Forensics for Fraud Cases on the Telegram Platform

Authors

  • Muh Rusman Universitas Muslim Indonesia
  • Ramdan Satra Universitas Muslim Indonesia
  • Huzain Azis Universitas Muslim Indonesia

DOI:

https://doi.org/10.56705/a4ev6r88

Keywords:

Digital Forensics, Telegram, Android, JPG File, NIST SP 800-86, FTK Imager

Abstract

The use of the Telegram application as a communication medium allows the exchange of image files that have the potential to become digital evidence, but in some cases the perpetrator deletes the files to eliminate digital traces. This study aims to analyze and prove the ability of the digital forensic process in finding and recovering deleted JPG image files on the Android-based Telegram application so that they can be used as valid digital evidence. The research method refers to the NIST SP 800-86 standard which includes the stages of collection, examination, analysis, and reporting, with the data acquisition process using the logical acquisition method through the Android Debug Bridge (ADB) without root access as well as analysis using FTK Imager and verification of data integrity through SHA-256 hash values. The results of the study show that JPG image files that have been deleted from the Telegram application can still be found and recovered from the internal storage media of Android devices in intact condition, have relevant metadata, and consistent hash values, so they are declared valid as digital evidence

References

[1] S. A. - and A. Zubaidi, “Wanita Ini Jadi Korban Penipuan di Misi Grup Telegram, Uang Rp 50 Juta Raib,” detikSumbagsel. Accessed: Dec. 20, 2025. [Online]. Available: https://www.detik.com/sumbagsel/hukum-dan-kriminal/d-7759233/wanita-ini-jadi-korban-penipuan-di-misi-grup-telegram-uang-rp-50-juta-raib?utm_source=chatgpt.com

[2] D. Fadilla, “Lagi, Penipuan Berkedok Freelance di Palembang Rugikan Korban Rp 31 Juta,” detikSumbagsel. Accessed: Dec. 20, 2025. [Online]. Available: https://www.detik.com/sumbagsel/hukum-dan-kriminal/d-7331159/lagi-penipuan-berkedok-freelance-di-palembang-rugikan-korban-rp-31-juta

[3] Aidil Wijaya Kusuma, Erick Irawadi Alwi, and Ramdaniah Ramdaniah, “Analisis Bukti Digital Pada Media Penyimpanan Flash Disk Menggunakan Metode National Institute Of Standards And Technology (NIST),” Cyber Secur. dan Forensik Digit., vol. 7, no. 1, pp. 18–24, 2024, doi: 10.14421/csecurity.2024.7.1.4345.

[4] H. Supardin, R. Satra, M. Arfah, and M. Foey, “Comparison Analysis of Digital Forensic Tools on Instagram Messenger using The National Institute of Standards and Technology ( NIST ) Method,” vol. 6, no. 1, pp. 65–75, 2022.

[5] D. M. Syafitri and F. Fachri, “Analisis forensik digital telegram pada android untuk,” vol. 10, no. 1, pp. 41–50, 2025.

[6] A. Raza and M. Bilal Hassan, “Digital Forensic Analysis of Telegram Messenger App in Android Virtual Environment,” Mob. Forensics, vol. 4, no. 1, pp. 31–43, 2022, doi: 10.12928/mf.v4i1.5537.

Downloads

Published

2026-04-22