Recent Backdoor Utilizes Telegram Bot API for Stealthy C2 Tactics

Recent findings by cybersecurity experts have brought to attention a novel backdoor written in Golang that leverages Telegram as a channel for command-and-control (C2) interaction.

Recent findings by cybersecurity experts have brought to attention a novel backdoor written in Golang that leverages Telegram as a channel for command-and-control (C2) interaction.
Netskope Threat Labs, who comprehensively outlined the characteristics of the malicious software, posited its potential origins in Russia.
“Formed using Golang, this malware functions as a backdoor upon activation,” stated security analyst Leandro Fróes during an in-depth examination

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.