Go-Based Backdoor Exploits Telegram for Covert Command Execution

Download PDF

A newly discovered backdoor malware, written in Go, has been found using Telegram as its command-and-control (C2) channel. Although still in development, the malware is already fully functional and capable of carrying out a range of malicious activities. Its behavior suggests that the malware could be of Russian origin. It operates as a backdoor, allowing attackers to issue commands remotely via Telegram, effectively turning the messaging platform into a covert control hub.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox