FBI Warns of Handala Hackers Using Telegram in Malware Attacks

Related

Polish Intelligence Warns Hackers Attacked Water Treatment Control Systems

What happened Poland’s Internal Security Agency, known as the ABW,...

Student Hacked Taiwan High-Speed Rail to Trigger Emergency Brakes

What happened A 23-year-old university student in Taiwan was arrested...

Telegram Mini Apps Abused for Crypto Scams and Android Malware Delivery

What happened CTM360 researchers have uncovered a large-scale fraud operation...

Ubuntu and Canonical Web Services Hit by DDoS Attack

What happened Canonical, the company behind the Ubuntu Linux distribution,...

Share

What happened

The FBI issued a warning that Iran-linked hackers tied to the country’s Ministry of Intelligence and Security (MOIS) are using Telegram as command-and-control infrastructure in malware campaigns. The activity has been attributed to the Handala hacktivist group and related state-linked actors, who are targeting journalists, dissidents, and opposition groups worldwide. According to the alert, attackers rely on social engineering to infect victims with Windows-based malware, which is then used to exfiltrate files and screenshots from compromised systems. The FBI said the campaigns are part of broader “hack-and-leak” operations aimed at intelligence collection and reputational damage amid heightened geopolitical tensions. 

Who is affected

Journalists, political dissidents, and individuals critical of the Iranian government are primarily affected, along with organizations and individuals globally who may be targeted through similar malware delivery tactics. 

Why CISOs should care

The campaign shows how attackers are increasingly leveraging widely used messaging platforms like Telegram as covert infrastructure for malware operations, blending social engineering with command-and-control activity. 

3 practical actions

  1. Monitor messaging platforms for abuse. Watch for suspicious links, files, or communications originating from Telegram-based channels. 
  2. Harden defenses against social engineering. The attacks rely on tricking users into executing malware rather than exploiting software flaws. 
  3. Detect data exfiltration behavior. Monitor for unusual file transfers or screenshot capture activity on endpoints. 

For more coverage of large-scale incidents and threat activity, explore our reporting on Cyberattacks.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts