Researchers have identified a new backdoor malware, written in Go programming language, that leverages Telegram as its command-and-control (C2) channel. While the malware appears to still be under development, it is already fully functional and capable of executing various malicious activities. This innovative use of cloud-based applications like Telegram for C2 communication poses significant challenges […]
The post New Go-Based Malware Exploits Telegram and Use It as C2 Channel appeared first on Cyber Security News.
This article has been indexed from Cyber Security News