Ransomware which abuses the Telegram app API has been stopped in its tracks only weeks after discovery. The malware, TeleCrypt, is typical ransomware in the way that the malicious code operates. If ...
Security researchers from Kaspersky Lab have come across a new ransomware variant that they named Telecrypt, which uses Telegram channels as C&C (command-and-control) servers. Because it relies on ...
A weakness in the protection of messages delivered using the Telegram Bot API gave researchers access to the communication flow between a piece of malware and its operator. Dubbed GoodSender by its ...
Threat actor exploits Fastlane plugin trust to redirect Telegram traffic via C2 server after Vietnam’s ban, targeting mobile app CI/CD pipelines. An ongoing supply chain attack is targeting the ...
Hackers have been found deploying an unfinished Russian malware, written in Golang, that leverages Telegram as its command-and-control (C2) channel. Netskope Threat Labs, the research wing of the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results