A newly identified Windows malware dubbed ResokerRAT abuses Telegram’s Bot API as its main command-and-control (C2) channel to remotely monitor and control infected systems without relying on a traditional attacker‑owned server. By blending in with legitimate encrypted Telegram traffic, it becomes harder for network defenses to distinguish its C2 communication from normal user activity. When ResokerRAT runs, […]
The post ResokerRAT Hijacks Telegram API to Command Infected Windows PCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.