Categories: NewsSecurity

Open Source Remote Access Trojan Targets Telegram Users

Remote access Trojans are mainly used to steal consumer data, either for consumers themselves or the conglomerate keeping this information safe from prying eyes. However, it appears criminals are looking at a different approach for these tools right now. A new open source remote access Trojan can now be used to extract data from the Telegram communication platform.

Telegram Users Are Susceptible to New RAT Attack

It is never a good sign when end-to-end encrypted communication tools are vulnerable to remote access Trojans. Unfortunately for all Telegram users, they have now become an official target for cybercriminals who make use of the RATAttack toolkit. This new open-source hacking tool has been unveiled by security researchers late last night, as it could have major consequences for all Telegram users.

It has to be said, this new tool is quite a significant improvement compared to how most traditional remote access Trojans work these days. To be more specific, a RAT requires attacks to enable port forward to seize control over infected hosts. Moreover, these Trojans do not use encryption, which remains a critical weakness. RAT developers need to address this problem as soon as possible, and RATAttack seems to be an example of how this problem can be solved with relative ease.

Note from the Author: The source code has been removed from GitHub but rest assured there are copies of it floating around on the Internet.

This particular tool uses the Telegram protocol to create an encrypted channel of communication between victims and the assailants. Moreover, it does not require port forwarding, since Telegram’s protocol takes care of all of those “issues” as well. In a way, one could argue Telegram is the perfect communication protocol for hackers to leverage when distributing remote access Trojans.

Related Post

Distributing this open source remote access Trojan is a bit of a challenge, though. The assailants first need to create their own proprietary telegram bot, which is relatively easy. The token generated by this bot needs to be edited into the RAT’s config file. Once someone interfaces with the bot, they will receive the RATAttack payload. Moreover, the person responsible for creating the bot will be able to interface with victims through the channel that is automatically created whenever a host is infected.  

Among the damage this RAT can cause are options to run keyloggers on a remote PC, retrieve IP information, download local files in the background and upload files to the computer. Criminals can also execute any file on the infected machine, which can lead to more malicious software being downloaded. In a way, RATAttack is a very versatile surveillance tool for criminals looking to cause harm to unsuspecting consumers.

It is evident open source “tools” like these can cause a lot of damage in the coming months.Telegram is one of the most favored end-to-end encrypted communication tools today. However, there are plenty of

alternative solutions to look into as well. Rest assured criminals will always find a new way to come up with solutions that will affect consumers in one way or another. Remote access Trojans are the flavor of the month, so to speak, but that doesn’t make them less dangerous.

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Binance Coin Whales Reap Big Profits as Polkadot Struggles; A New Crypto Presale Is Dominating Investor Attention

BNB is already flashing signs of a bearish sentiment despite launching a new stablecoin while…

1 hour ago

Three Crypto That Surprised The Market: Rollblock, Cardano, and XRP

The crypto market is no stranger to unexpected twists. However, the recent performances of Rollblock,…

1 hour ago

As Bonk (BONK) and Pepe (PEPE) Shine, Rollblock (RBLK) Captures the Market’s Attention With Upcoming Reveal

Meme coins are back with a bang and are as insanely volatile as ever! Bonk…

1 hour ago

2024’s Top 9 Crypto Staking Platforms to Make Passive Income

Staking has become one of the most effortless ways to generate passive income in the…

4 hours ago

Qubetics, Algorand, and Near Protocol: Best Cryptos to Buy in November 2024

Qubetics, Algorand, and Near Protocol: The Best Cryptos to Buy in November 2024—Which One Is…

16 hours ago

Top 6 Crypto Presales of 2024-2025: Secure Your Long-Term Gains Now

Are you on the lookout for the best crypto presale opportunities to secure your financial…

1 day ago