June 26, 2024, 7:31 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


Hello, cybersecurity enthusiasts and white hackers!



Like in the previous malware development trick example, this post is just for showing Proof of Concept.


In the practice example with Telegram API, the attacker has one weak point: if the victim’s computer does not have a Telegram client or let’s say that messengers are generally prohibited in the victim’s organization, then you must agree that interaction with Telegram servers may raise suspicion (whether through a bot or not).


Some time …

api attacker client computer concept cybersecurity data development hackers hello legit malware malware analysis malware development point practice proof simple stealing telegram telegram api trick victim virustotal weak point

Watch Officer and Operations Officer

@ Interclypse | Arlington, VA, US

Sales Development Representative

@ Devo | United States

Principal Software Engineer

@ Oracle | Seattle, WA, United States

Engineering Manager, Cloud - TDIR (Remote)

@ CrowdStrike | USA CA Remote

Linux System Administrator II

@ Peraton | Fort Meade, MD, United States

Linux System Administrator

@ Peraton | Fort Meade, MD, United States