New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations,
Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications.
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
« The malware is compiled in Golang and once executed it acts like a backdoor, » security researcher Leandro Fróes said in an analysis
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
« The malware is compiled in Golang and once executed it acts like a backdoor, » security researcher Leandro Fróes said in an analysis
,
Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications.
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
« The malware is compiled in Golang and once executed it acts like a backdoor, » security researcher Leandro Fróes said in an analysis
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
« The malware is compiled in Golang and once executed it acts like a backdoor, » security researcher Leandro Fróes said in an analysis
, ,
https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html