Source |
Netskope |
Identifiant |
8648498 |
Date de publication |
2025-02-14 15:00:00 (vue: 2025-02-14 15:08:06) |
Titre |
Telegram Abused as C2 Channel for New Golang Backdoor |
Texte |
>Summary As part of Netskope Threat Labs hunting activities, we came across an IoC being shared by other researchers and decided to take a closer look at it. During the analysis, we discovered that the payload was apparently still under development, but is already fully functional. The malware acts like a backdoor and uses Telegram […]
>Summary As part of Netskope Threat Labs hunting activities, we came across an IoC being shared by other researchers and decided to take a closer look at it. During the analysis, we discovered that the payload was apparently still under development, but is already fully functional. The malware acts like a backdoor and uses Telegram […]
|
Notes |
★★
|
Envoyé |
Oui |
Condensat |
>summary abused across activities acts already analysis apparently backdoor being but came channel closer decided development discovered during fully functional golang hunting ioc labs like look malware netskope new other part payload researchers shared take telegram threat under uses |
Tags |
Malware
Threat
|
Stories |
|
Move |
|