New Golang-Based Backdoor Leverages Telegram Bot API for Evasive C2 Operations
February 17, 2025
In a recent development within the cybersecurity landscape, researchers have uncovered a new backdoor malware written in Golang that employs the Telegram Bot API for its command-and-control (C2) operations. This malware, potentially originating from Russia, has been detailed by Netskope Threat Labs, which provided insights into its functionality and operational methodology.
The Golang-compiled malware is engineered to function as a backdoor once executed. According to security analyst Leandro Fróes, the malware remains fully operational despite indications that it is still in the developmental phase. A critical mechanism of the backdoor is its initialization process, where it verifies if it is executing from a specified path—specifically “C:\Windows\Temp\svchost.exe.” If the criteria are not met, it reads its own binary code, writes it to the designated directory, and launches a new process using the copied version before terminating its original instance.
A particularly intriguing aspect of this malware is its utilization of an open-source library that integrates Golang bindings for the Telegram Bot API. This enables the backdoor to facilitate C2 communication discreetly, exploiting Telegram’s infrastructure to bypass traditional security measures. By leveraging this widely used messaging platform, the malware can effectively maintain persistence and evade detection.
As business owners and cybersecurity professionals navigate this evolving threat landscape, it is essential to recognize the potential tactics employed in this attack. Utilizing the MITRE ATT&CK framework, we can identify several relevant tactics. The backdoor likely employs techniques for initial access, persistence, and potentially privilege escalation, raising the stakes for affected environments.
Given the sophistication of this Golang-based malware, it underscores the necessity for robust cybersecurity measures tailored to counteract such threats. Organizations must remain vigilant, ensuring that their defenses are equipped to intercept communications potentially masked within legitimate applications like Telegram.
As the cyber threat landscape continues to evolve, staying informed about emerging vulnerabilities and attack methodologies is crucial for safeguarding business operations against advanced persistent threats. The use of techniques similar to what has been observed with this malware highlights an urgent need for enhanced monitoring and incident response strategies, enabling organizations to mitigate risks effectively.