Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » New Backdoor based on Golang uses API Telegram Bot to evade C2 operations
Global Security

New Backdoor based on Golang uses API Telegram Bot to evade C2 operations

AdminBy AdminFebruary 17, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 17, 2025Red LakshmananIntelligence threats / cyber -ataka

Cybersecurity researchers spilled light on a new back hill, which uses a telegram as a mechanism of team communications and control (C2).

The NETSKOPE threat laboratories, which describe the functions of malicious software, described it as perhaps Russian origin.

“Malicious software consists in Holong and once performs it as a back”, a security researcher Leandra Fros – Note in an analysis published last week. “Although malicious software seems to be still in development, it is quite functional.”

Cybersecurity

After launching the Backdoor is designed to check if it works in a certain place and using a specific name – “C: \ Windows \ Temp \ svchost.exe” – and if not, it reads its own contents, writes them in this place. , and creates a new process to launch a copied version and stop yourself.

A characteristic aspect of malicious software is that it uses Library with open source This offers GOLANG bindings for API Telegram Bot for C2 purposes.

This involves interaction with API Telegram Bot for new team -controlled chat teams. It supports four different teams, although now only three of them are being implemented –

  • /CMD – Complete commands via PowerShell
  • /Sustainable – restored in “C: \ Windows \ Temp \ svchost.exe”
  • /screenshot – not implemented
  • /
Cybersecurity

The exit of these teams is sent back to the Telegram channel. Netskope said the “/screenshot” team sends the “screenshot” message, despite the fact that it was not completely excluded.

The Russian roots of malicious software are explained by the fact that the instruction “/CMD” sends the message “Enter the command:” In Russian in chat.

“The use of cloud applications is a difficult problem for defenders and attackers who know about it,” Fros said. “Other aspects, such as how easy it is to install and start using the application, are examples of why attackers use applications such as in different stages of the attack.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025

South Asia ministries affected by SIDGE APT using old office deficiencies and custom malicious programs

May 20, 2025

Basic ideas from the 2025 state report

May 20, 2025

Chinese hackers unfold the back of Marsssnake in a perennial attack on the Saudi Organization

May 20, 2025

Based on GO based on malicious programs deployed Xmrig Miner on hosts Linux through Redis configuration abuse

May 20, 2025

Malicious Pypi Packages Operating Instagram and Tiktok API to verify users’ accounts

May 20, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Hazy Hawk exploits DNS Records in CDC CDC, Corporate Domains for Delivery Programs

May 20, 2025

100+ fake expansion of chromed found sessions, theft of credentials, injection ads

May 20, 2025

AWS default Iam roles that allow you to enable side motion and cross -service operation

May 20, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.