Hackers Use Telegram as Malicious C2 Centers to Distribute ‘Nova’ Malware

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

Hackers increasingly adopt trusted platforms such as Telegram, Slack, and Discord to route communications from their malware and execute Command and Control (C2) functions. Their association with well-known, trusted services enables attackers to bypass standard network defenses. 

Platforms like Telegram allow malware to camouflage its activity, hiding in plain sight. Telegram-based C2 malware typically operates through these phases:

Attack chain using Telegram as C2 | Source: Ben Folland/polygonben

These techniques are actively exploited in real-world scenarios. Low-tier attackers (known as "script kiddies") aggressively employ this tactic to distribute info stealers and keyloggers and gather sensitive credentials or credit card data. 

High-profile groups, such as the Lazarus Group, have even leveraged Telegram for remote access trojans (RATs), cementing its relevance as a primary C2 mechanism.

By analyzing malware samples embedded with Telegram bot tokens sourced via platforms like VirusTotal, Ben Folland was able to infiltrate the attackers' communications channels. One operator even tested malware on their own machine, inadvertently leaking critical screenshots and log data.  

This lapse provided direct insight into the attacker's infrastructure, including associated phishing campaigns and malicious domains, and methods used for credential harvesting, such as phishing schemes that utilized malicious Telegram-integrated bots. 

It also showed operational mistakes that showcased how the malware interacted with production systems, revealing specific tactics and procedures. Analysis revealed backend infrastructure that was used to disseminate mass phishing emails. 

Nova malware campaign example | Source: Ben Folland/polygonben

The analysis presented a study case where a phishing email impersonating DHL contained the Nova malware–a recently discovered derivative of the infamous Snake Keylogger–within a .7z attachment. 

The Nova malware has demonstrated elevated levels of sophistication and capabilities to exfiltrate data over FTP or Telegram. This tool relies heavily on process injection, payload decryption with TripleDES, and credential theft from browsers like Chrome.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: