new-golang-based-backdoor-uses-telegram-bot-api-for-evasive-c2-operations

Cybersecurity analysts have uncovered a new Golang-based backdoor that employs Telegram for its command-and-control (C2) communication.
Netskope Threat Labs, which outlined the capabilities of the malicious software, suggested that it might be of Russian provenance.
“The malicious program is compiled in Golang, and when launched, it operates as a backdoor,” security expert Leandro Fróes stated in an evaluation.


Leave a Reply

Your email address will not be published. Required fields are marked *

Share This