New Golang-Based Backdoor Leverages Telegram Bot API for Stealthy C2 Operations

February 17, 2025
Threat Intelligence / Cyber Attack

Cybersecurity experts have revealed a new backdoor written in Golang that employs Telegram for command-and-control (C2) communications. Netskope Threat Labs, which analyzed the malware, suspects it may have origins in Russia. Security researcher Leandro Fróes commented, “The malware is compiled in Golang and functions as a backdoor. While it appears to be in active development, it is fully operational.” Upon execution, the backdoor verifies its location and specific file name—“C:\Windows\Temp\svchost.exe”—and if conditions aren’t met, it duplicates itself into the intended directory, launches the copied version, and then terminates its own process. A significant feature of this malware is its use of an open-source library that provides Golang bindings for the Telegram Bot API for C2 operations. This implementation includes…

New Golang-Based Backdoor Leverages Telegram Bot API for Evasive C2 Operations

February 17, 2025

In a recent development within the cybersecurity landscape, researchers have uncovered a new backdoor malware written in Golang that employs the Telegram Bot API for its command-and-control (C2) operations. This malware, potentially originating from Russia, has been detailed by Netskope Threat Labs, which provided insights into its functionality and operational methodology.

The Golang-compiled malware is engineered to function as a backdoor once executed. According to security analyst Leandro Fróes, the malware remains fully operational despite indications that it is still in the developmental phase. A critical mechanism of the backdoor is its initialization process, where it verifies if it is executing from a specified path—specifically “C:\Windows\Temp\svchost.exe.” If the criteria are not met, it reads its own binary code, writes it to the designated directory, and launches a new process using the copied version before terminating its original instance.

A particularly intriguing aspect of this malware is its utilization of an open-source library that integrates Golang bindings for the Telegram Bot API. This enables the backdoor to facilitate C2 communication discreetly, exploiting Telegram’s infrastructure to bypass traditional security measures. By leveraging this widely used messaging platform, the malware can effectively maintain persistence and evade detection.

As business owners and cybersecurity professionals navigate this evolving threat landscape, it is essential to recognize the potential tactics employed in this attack. Utilizing the MITRE ATT&CK framework, we can identify several relevant tactics. The backdoor likely employs techniques for initial access, persistence, and potentially privilege escalation, raising the stakes for affected environments.

Given the sophistication of this Golang-based malware, it underscores the necessity for robust cybersecurity measures tailored to counteract such threats. Organizations must remain vigilant, ensuring that their defenses are equipped to intercept communications potentially masked within legitimate applications like Telegram.

As the cyber threat landscape continues to evolve, staying informed about emerging vulnerabilities and attack methodologies is crucial for safeguarding business operations against advanced persistent threats. The use of techniques similar to what has been observed with this malware highlights an urgent need for enhanced monitoring and incident response strategies, enabling organizations to mitigate risks effectively.

Source link