FBI says Iranian hackers are using Telegram to steal data in malware attacks
Once the target installs the malware, the second stage of the attack connects the infected victim with Telegram bots that allow the hackers to remotely command and control the victim’s computer. This allows the hackers to gain remote control of victims’ devices to steal files, take screenshots, and record Zoom calls, according to the FBI.
According to the FBI, the hackers responsible for these attacks are allegedly working for Iran’s Ministry of Intelligence and Security (MOIS).
Earlier this month, Handala claimed responsibility for an attack on medical tech giant Stryker, which resulted in wiping tens of thousands of employee devices.
Securities and Exchange Commission on Monday, Stryker said it is still recovering from the hack. Justice Department accused Handala of being a front for Iran’s government, specifically the MOIS, and for being behind the Stryker hack. At the same time, the FBI took down and seized two websites linked to Handala, and two other sites linked to another Iranian hacktivist group called “Homeland Justice.
” In the recent FBI alert, the bureau said the two groups are linked and controlled by the MOIS.
An FBI spokesperson said in an email that the bureau “has nothing additional to add. ” Telegram’s spokesperson Remi Vaughn said that the platform’s “moderators routinely remove any accounts found to be involved with malware. ” Updated to include the FBI’s and Telegram’s response
Logic Quality Breakdown:
- Updated_At:
- Truth_Blocks:
- Analysis_Method: