Go-Based Backdoor Exploits Telegram for Covert Command Execution
Download PDFA newly discovered backdoor malware, written in Go, has been found using Telegram as its command-and-control (C2) channel. Although still in development, the malware is already fully functional and capable of carrying out a range of malicious activities. Its behavior suggests that the malware could be of Russian origin. It operates as a backdoor, allowing attackers to issue commands remotely via Telegram, effectively turning the messaging platform into a covert control hub.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox