Cyber threats continue to evolve and one of the latest emerging threats identified by CYFIRMA research team is the Angry Stealer malware. This info-stealer has been discovered to be actively ...
The fine researchers at Google have released the juicy details on EntrySign, the AMD Zen microcode issue we first covered ...
However, what makes it really stand out from the crowd is its C2 infrastructure - it uses a special function to create a bot instance, using a Telegram API token generated via Botfather.
Attackers on Telegram are disguising malicious scripts as videos and tricking users into running them. Accidental clicking ...
According to the researchers, C2 communication being established by the malware could easily be mistaken for legitimate Telegram API deployments, making its detection difficult. “Although the ...
Threat actors are using Telegram as command and control (C2 ... it is difficult for defenders to differentiate C2 communications and a legitimate user using an API in cloud apps. The researchers said ...