Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Russian malware discovered with Telegram hacks for C2 operations
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Russian malware discovered with Telegram hacks for C2 operations

Commands for code execution and persistence: The researchers said the backdoor currently accepts four C2 commands in total, which are sent to the Telegram channel via the Send package function, out of which one is yet to be implemented.The most critical is the “/cmd” command for executing PowerShell codes, which can allow unauthorized access to system resources. This command is received within the Telegram channel as two separate chat messages, one being the “/cmd” command itself and the other being the PowerShell command to be executed.Using the “/persist” command, the malware first checks if it is being run at a specific location in the local system and, if not running already, relaunches itself and exits. A “selfdestruct” command is also implemented to wipe the malware out from the said location and terminate itself.There is a “/screenshot” command that has been provisioned in the malware but hasn’t been fully implemented, researchers said. The Netskope team has shared the IOCs and scripts related to the malware at a dedicated GitHub repository. A few other legitimate applications like OneDrive, Github, DropBox, Discord, TOR, etc have also been abused by threat actors in the past for establishing quicker and difficult-to-detect C2 channels.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3826808/russian-malware-discovered-with-telegram-hacks-for-c2-operations.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link