Using Telegram as its command-and-control (C2) mechanism, a new strain of malware, a bot dubbed Zaraza, is capable of extracting login credentials from a victim’s open browser and saving them to a file, as well as taking screenshots of open windows to be saved in a JPG file.First identified by…
Source: www.darkreading.com – Read more
.webp?w=0&resize=0,0&ssl=1)
New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems
A new Remote Access Trojan (RAT) called ResokerRAT has been found targeting Windows systems by abusing Telegram’s widely used Bot API to receive commands and


