February 21, 2025
By Cybervergent Team

When Your Chat App Turns Against You

There’s a new golang-based backdoor in the wild, possibly of Russian origin, sneaking into systems, using Telegram as its command-and-control(C2) channel. And while it's still a work in progress, it's already proving to be a fully functional cyber menace.

Why Are Hackers So Obsessed with Cloud Apps?

Setting up a traditional C2 infrastructure is hard work for hackers. But cloud apps like Telegram, OneDrive, GitHub, and Dropbox? They’re a goldmine—widely trusted, hard to detect, and ridiculously easy to exploit.

No need for fancy servers– Just hijack a cloud app's API.
Blends in with legit traffic – Security tools struggle to tell friend from foe.
More bang for their buck – Attackers can scale fast without setting off alarms.

How It Operates

First, it checks its disguise.

• The malware wants to run from a specific location: C:\Windows\Temp\svchost.exe.

• If not, it copies itself there, launches, and deletes its tracks. Sneaky!

Then, it gets cozy with Telegram.

• Using a Go-based API, it sets up a bot, connects to a hidden chat, and waits for orders from its master.

And finally, it executes evil commands.

• /cmd – Runs PowerShell commands (hello, remote control).

• /Persist – Ensures it survives reboots (like an annoying guest).

• /screenshot – Captures whatever’s on your screen (privacy? What’s that?).

• /Selfdestruct – Deletes itself when the job’s done (James Bond vibes).

Every response is encrypted and sent back through Telegram, keeping things low-key and nearly undetectable.

Our Cybersecurity Forecast

This Golang-Telegram malware is just the tip of the iceberg. Attackers are getting craftier, cloudier, and creepier. And if Telegram, a messaging app—is now a malware command center, what’s next? Attackers slipping into Google Drive, Slack, or Zoom?

Expect more malware using cloud apps for C2. If attackers can blend into everyday internet traffic, they’ll keep doing it.

TTPs will evolve—this is just version 1.0 of the Golang backdoor. Future updates? Even stealthier.

Security teams must adapt fast. Traditional detection methods won’t cut it anymore. Behavior-based monitoring and Zero Trust policies need to become the norm.

How to Stay Safe

Watch your outbound traffic– Cause why are you having random telegram bot interactions
Monitor PowerShell activity – If an unknown process is running PowerShell, it's time to investigate.
Zero Trust everything – Just because it’s cloud-based doesn’t mean it’s safe.
Train your team – Phishing and social engineering are still malware’s favorite delivery boys.