Telegram RAT Escapes Detection via Cloud Apps

A new remote access Trojan is using cloud-based tools to evade traditional security scanners that can’t inspect SSL or provide cloud application-level traffic inspection, according to researchers at Netskope Threat Research Labs. TelegramRAT uses Dropbox as its payload host and Telegram Messenger for command and control.

Read full news article on Dark Reading: Cloud

 


Date:

Categorie(s):