Recent findings by cybersecurity experts have brought to attention a novel backdoor written in Golang that leverages Telegram as a channel for command-and-control (C2) interaction.
Netskope Threat Labs, who comprehensively outlined the characteristics of the malicious software, posited its potential origins in Russia.
“Formed using Golang, this malware functions as a backdoor upon activation,” stated security analyst Leandro Fróes during an in-depth examination
Netskope Threat Labs, who comprehensively outlined the characteristics of the malicious software, posited its potential origins in Russia.
“Formed using Golang, this malware functions as a backdoor upon activation,” stated security analyst Leandro Fróes during an in-depth examination
