Researchers have discovered a new functional backdoor malware, which uses Telegram as its command-and-control (C2) channel. The malware functions as a backdoor performing an initial self-installation process, monitors channels for incoming commands and supports four commands for executing various actions, three of which have been fully implemented. The malware’s use of cloud applications like Telegram complicates detection efforts, posing a significant challenge for cybersecurity defenders.

CISOs are spending big and still losing ground
Security leaders are entering another budget cycle with more money to work with, but many still feel no safer. A new benchmark study from Wiz


