A new Go language backdoor uses the Telegram Bot API for concealed command control

0 21
Cybersecurity researchers recently revealed a new type of backdoor program b...

image

Cybersecurity researchers recently revealed a new type of backdoor program based on the Go language, which uses Telegram as the mechanism for command and control (C2) communication. Netskope's threat lab has analyzed the functionality of the malware in detail and pointed out that it may originate from Russia.

Backdoor features and operation mechanism

A new Go language backdoor uses the Telegram Bot API for concealed command control

Security researcher Leandro Fróes said in an analysis report released last week that 'the malware is compiled in Go language and will appear as a backdoor once executed. Although it seems to still be in the development stage, it has already been fully functional.'

After the backdoor is launched, it will check whether it is running under a specific path with a specific name 'C:\Windows\Temp\svchost.exe'. If not, it will read its own content and write it to that path, then create a new process to start the copied version and terminate itself.

Concealed communication using the Telegram Bot API

A notable feature of this malware is that it uses an open-source Go language binding library to implement command and control communication through the Telegram Bot API. Specifically, it interacts with the Telegram Bot API to receive commands from the attacker's control chat. Currently, it supports four different commands, although only three have been implemented:

  • /cmd: Execute commands through PowerShell.
  • /persist: Restart itself under the path 'C:\Windows\Temp\svchost.exe'.
  • /screenshot: Not implemented.
  • /selfdestruct: Delete the file 'C:\Windows\Temp\svchost.exe' and terminate itself.

The execution results of these commands will be sent back to the Telegram channel. Netskope points out that although the '/screenshot' command has not been fully developed, it will send a message saying 'Screenshot captured'.

Russian background and attacker strategy

The Russian background of the malware can be evidenced by the Russian message 'Enter the command:' sent through the '/cmd' command to the chat.

Fróes added, 'The use of cloud applications brings complex challenges to defenders, and attackers are also aware of this. In other aspects, such as the convenience of setting up and launching applications, one of the reasons attackers use such applications at different stages of attacks is due to this convenience.'

Through this innovative communication method, attackers can conduct remote control more discreetly, and it also highlights the new challenges brought by cloud services in the field of cybersecurity.

Reference source:

A new Golang-based backdoor uses the Telegram Bot API for evasive C2 operations

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Generative AI Red Team Testing: How to Effectively Evaluate Large Language Models

How to use large language models (LLMs) to automatically detect BOLA vulnerabilities

最后修改时间:
admin
上一篇 2025年03月26日 14:30
下一篇 2025年03月26日 14:53

评论已关闭