Threat IntelHIGH

Iranian Hackers - Using Telegram for Data Theft Operations

TCTechCrunch Security
Iranian hackersFBITelegramHandalaMOIS
🎯

Basically, Iranian hackers use Telegram to trick people into installing malware that steals their data.

Quick Summary

Iranian hackers are using Telegram to target dissidents and journalists. The FBI warns of their deceptive tactics and the potential for significant data theft. Awareness and vigilance are crucial to counter these threats.

The Threat

The FBI has issued a warning about Iranian government hackers using Telegram to conduct malware attacks against dissidents, opposition groups, and journalists. This alarming trend highlights the lengths to which these hackers will go to push their regime's geopolitical agenda. The hackers initiate contact with their targets, posing as known contacts or tech support, to trick them into downloading malicious files disguised as legitimate applications like Telegram and WhatsApp.

Once the target installs the malware, the hackers gain remote control over the victim's device. This allows them to steal files, take screenshots, and even record Zoom calls. This method of using Telegram as a command and control channel is particularly insidious, as it blends malicious activity with legitimate network traffic, making detection by cybersecurity defenses much more challenging.

Who's Behind It

The FBI attributes these attacks to hackers working for Iran's Ministry of Intelligence and Security (MOIS). The alert also references the pro-Iranian hacktivist group Handala, although it remains unclear if they are directly involved in these specific attacks. Earlier this month, Handala claimed responsibility for a significant cyberattack on medical tech giant Stryker, resulting in the wiping of tens of thousands of employee devices. This connection underscores the broader implications of Iranian cyber operations.

Tactics & Techniques

The tactics employed by these hackers are sophisticated and deceptive. By masquerading as trusted contacts, they exploit the trust of their victims, leading them to unknowingly install malware. This two-stage attack not only compromises the victim's device but also allows the hackers to maintain a persistent presence through Telegram bots. This method of operation is not just a random act; it is part of a calculated strategy to silence dissent and gather intelligence on opposition figures.

Defensive Measures

To protect yourself from such attacks, it is crucial to be vigilant about unsolicited communications. Always verify the identity of anyone requesting sensitive information or urging you to download files. Additionally, consider using security software that can detect and block malicious activities. Regularly updating your devices and applications can also help mitigate vulnerabilities that hackers might exploit. Staying informed about the latest threats and employing good cybersecurity hygiene are essential steps in defending against these sophisticated attacks.

🔒 Pro insight: The use of Telegram for command and control highlights a shift in tactics, blending malicious activity within legitimate communication channels.

Original article from

TechCrunch Security · Lorenzo Franceschi-Bicchierai

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Faster Attacks and Recovery Denial Ransomware

Mandiant's latest report reveals a shift in ransomware tactics and faster cyberattacks. Organizations must adapt to these evolving threats to protect their recovery systems. The implications are significant, as attackers increasingly target critical infrastructure.

CSO Online·
HIGHThreat Intel

Phishing Campaign - Attackers Target Multiple Sectors

A phishing campaign is targeting critical sectors like healthcare and education with fake copyright notices. This poses a serious risk of data breaches. Organizations must act quickly to safeguard sensitive information.

Dark Reading·
HIGHThreat Intel

High-Tech Sector - Overtakes Finance as Cyber Attack Target

In a surprising turn, the high-tech sector has become the top target for cyber-attacks in 2025, surpassing finance. This shift raises concerns for tech companies and their data security. Mandiant's report highlights the need for enhanced cybersecurity measures across industries.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Mandiant's Insights on Evolving Cyber Threats

Mandiant's M-Trends 2026 report reveals how cyber threats are evolving. Organizations face increased risks from ransomware and voice phishing tactics. Understanding these trends is vital for improving security measures and defending against sophisticated attacks.

Mandiant Threat Intel·
HIGHThreat Intel

Trivy Supply Chain Attack - New Compromised Docker Images Found

Aqua Security's Trivy vulnerability scanner faces a serious threat as new compromised Docker images are discovered. Developers using these images in CI/CD pipelines must act quickly to mitigate risks. The TeamPCP threat group is behind this attack, highlighting the ongoing challenges in securing software supply chains.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Aqua Security Repositories Defaced by TeamPCP

Aqua Security's GitHub repositories were defaced after a supply chain attack involving malicious Trivy images. The breach exposed sensitive developer data and internal tools, raising significant security concerns.

Security Affairs·