Threat Intelligence, Malware, Application security

Telegram API exploited by new Golang backdoor

Telegram app on smartphone screen. Telegram messenger, free speech, security, privacy

Hackread reports that suspected Russian threat actors have been continuously developing a novel Golang backdoor that abuses Telegram's API for command-and-control communications in place of attacker-specific infrastructure.

Execution of the payload, dubbed Trojan.Generic.37477095, triggers the "installSelf" function that ensures operation from the intended location before establishing C2 through a Telegram-interacting open-source package, according to an analysis from Netskope. Three of four commands supported by the backdoor have already been implemented, including "/cmd" allowing PowerShell command execution, "/persist" enabling malware relaunching, and "/selfdestruct" facilitating malware file removal and process termination. "Although the use of cloud apps as C2 channels is not something we see every day, it's a very effective method used by attackers not only because there's no need to implement a whole infrastructure for it, making attackers' lives easier, but also because it's very difficult, from a defender perspective, to differentiate what is a normal user using an API and what is a C2 communication," said researchers.

An In-Depth Guide to Application Security

Get essential knowledge and practical strategies to fortify your applications.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds