New Go-Based Malware Exploits Telegram and Use It as C2 Channel

Researchers have identified a new backdoor malware, written in Go programming language, that leverages Telegram as its command-and-control (C2) channel. While the malware appears to still be under development, it is already fully functional and capable of executing various malicious activities. This innovative use of cloud-based applications like Telegram for C2 communication poses significant challenges […]

The post New Go-Based Malware Exploits Telegram and Use It as C2 Channel appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: