A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server.
Stealthy C2 messages operated by the Golang backdoor could easily be mistaken for legitimate Telegram API communication.
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results