• Home
  • About
  • Locations
logologologologo
  • Plan
    • vCISO
    • Policies & Procedures
    • Strategy & Security Program Creation
    • Risk Management
  • Attack
    • Penetration Testing
    • PTaaS
    • Red Teaming
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • IOT Penetration Testing
  • Defend
    • Office 365 Security
    • HIPAA Compliance
    • PCI Compliance
    • Code Reviews
    • Blockchain Security Analysis
    • Vulnerability Assessments
  • Recover
    • Ransomware Recovery
    • Expert Witness
    • Forensics
  • Learn
    • Resources
    • Penetration Testing Training
    • Blog
  • Contact Us
  • Instant Quote
✕

Cybercriminals are increasingly shifting away from traditional command and control infrastructure and instead leveraging trusted platforms to operate in plain sight. One platform that has become central to this evolution is Telegram.

April 1, 2026

Meta Description
A new ResokeRAT malware campaign is using Telegram as command and control infrastructure to steal credentials and maintain persistence. This technical analysis explains how the attack works and what organizations must do now.


Introduction

Cybercriminals are increasingly shifting away from traditional command and control infrastructure and instead leveraging trusted platforms to operate in plain sight. One platform that has become central to this evolution is Telegram.

The emergence of ResokeRAT, a Telegram-based remote access trojan, highlights how attackers are abusing legitimate services to simplify operations, evade detection, and scale attacks rapidly.

Rather than building complex infrastructure, attackers now rely on Telegram bots and APIs to control infected systems and exfiltrate data, making these campaigns more resilient and harder to disrupt.


What Happened

Security researchers uncovered a new malware campaign deploying ResokeRAT, a remote access trojan that uses Telegram as its primary communication channel.

The malware is distributed through typical infection vectors such as:

Phishing emails
Malicious downloads
Trojanized software installers

Once executed, ResokeRAT establishes communication with attacker-controlled Telegram bots, allowing operators to:

Send commands to infected machines
Receive stolen data in real time
Maintain persistent remote access

This approach removes the need for dedicated command-and-control servers, making the attack infrastructure more difficult to detect and shut down.


Why Telegram Is Being Used by Attackers

Telegram has become a preferred tool for cybercriminals due to its flexibility and accessibility.

Key advantages include:

No need to maintain dedicated C2 infrastructure
Built-in encryption and global accessibility
Easy automation through bot APIs
Rapid channel creation and recovery if taken down

Security research confirms that Telegram is now widely used for data exfiltration, command execution, and malware coordination, effectively replacing traditional infrastructure in many campaigns .

This shift represents a major evolution in how cyberattacks are managed.


How the Attack Chain Works

The ResokeRAT campaign follows a structured multi-stage attack chain.

Initial Access

Victims are tricked into downloading and executing a malicious file through phishing or fake software.

Payload Execution

The malware installs itself and begins executing in the background, often using obfuscation techniques to avoid detection.

Telegram-Based Command and Control

ResokeRAT connects to a Telegram bot using the Telegram API, enabling real-time communication with attackers.

Credential Theft and Data Collection

The malware collects:

Browser credentials
Session cookies
System information
Potentially sensitive files

Data Exfiltration

Stolen data is sent directly to attacker-controlled Telegram channels or bots.


Common Techniques Used in the Campaign

ResokeRAT leverages a combination of modern malware techniques.

Living-Off-Trusted Infrastructure

Using Telegram instead of traditional servers to avoid detection.

Credential Harvesting

Extracting login data from browsers and applications.

Remote Command Execution

Allowing attackers to control infected systems in real time.

Persistence Mechanisms

Ensuring the malware remains active even after system restarts.

Obfuscation and Evasion

Using encryption and code obfuscation to bypass security tools.

These techniques make the malware both stealthy and effective.


Why This Campaign Is Dangerous

This campaign is particularly concerning because it blends into legitimate network activity.

Key risks include:

Telegram traffic often appears legitimate
No obvious malicious infrastructure to block
Fast recovery if channels are removed
Low barrier to entry for attackers

Telegram’s role as a cybercrime operational hub means attackers can easily scale campaigns and coordinate attacks without specialized infrastructure .


Potential Impact on Organizations

If successful, ResokeRAT infections can lead to serious consequences.

Possible impacts include:

Unauthorized remote access to systems
Credential theft and account takeover
Data exfiltration and espionage
Lateral movement within networks
Deployment of additional malware

Because attackers gain persistent access, the threat can remain active for long periods.


What Organisations Should Do Now

Organizations must take proactive steps to defend against Telegram-based malware.

Recommended actions include:

Block or monitor access to Telegram APIs where not required
Implement strong endpoint detection and response solutions
Enforce multi-factor authentication across systems
Restrict execution of unknown files and scripts
Train employees to identify phishing attempts

Reducing reliance on user trust is critical in preventing initial compromise.


Detection and Monitoring Strategies

Security teams should monitor for:

Connections to Telegram API endpoints
Unusual outbound traffic patterns
Unauthorized process execution
Credential access anomalies
Suspicious persistence mechanisms

Experts recommend restricting access to Telegram infrastructure if it is not required for business operations .


The Role of Penetration Testing

Penetration testing helps identify weaknesses that allow malware deployment.

Testing should include:

Phishing simulation campaigns
Endpoint compromise scenarios
Credential harvesting simulations
Detection and response validation

These exercises help organizations understand how attackers exploit trusted platforms.


Key Takeaway

The ResokeRAT campaign demonstrates how attackers are increasingly leveraging legitimate platforms like Telegram to conduct cyberattacks. By eliminating the need for traditional infrastructure, these threats become harder to detect, block, and disrupt.

Organizations must adapt by focusing on behavioral monitoring, identity security, and strict control of external communication channels to defend against this evolving threat landscape.

Contact Us Now to Prepare
for Digital Warfare


      • info@digitalwarfare.com

      • +1 757-900-9968

Share
Copyright © Digital Warfare. All rights reserved.
  • Home
  • About
  • Locations