Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Pastebin PowerShell Script Targets Telegram Sessions

Pastebin PowerShell Script Targets Telegram Sessions

Posted on April 24, 2026 By CWS

Cybersecurity experts have recently detected a malicious PowerShell script hosted on Pastebin, engineered to covertly steal session data from Telegram users. This script targets both desktop and web versions of Telegram, posing a significant risk to user privacy and security.

Disguised Under a Deceptive Name

The script masquerades as a typical Windows update, cleverly named “Windows Telemetry Update,” which misleads users into executing it without suspicion. Upon activation, it swiftly gathers host information such as the username, computer name, and public IP using api.ipify[.]org, before focusing on its primary goal of capturing Telegram session files.

These session files, found within the %APPDATA% directories for Telegram Desktop and Telegram Desktop Beta, are compressed into a file named “diag.zip” and temporarily stored in the user’s TEMP folder. The script’s deceptive nature makes it a high-severity threat, as identified by Flare analysts who continuously monitor Pastebin and similar platforms for malicious content.

Detailed Analysis and Development

According to the analysis, this script is specifically designed to steal Telegram session data, transmitting it via the Telegram Bot API. It operates alongside another tool targeting web-based sessions, sharing the same infrastructure. The script’s simplicity is overshadowed by the insights it provides into the development and testing of session-stealing tools.

Two versions of the script were discovered on Pastebin, both posted by the same user. The first version failed to send the “diag.zip” file due to a flawed multipart upload implementation. The operator later rectified this in the second version, which successfully uses the sendDocument endpoint with proper encoding, illustrating the debugging and refinement process publicly visible on Pastebin.

Operational Implications and Security Measures

Although the script lacks obfuscation and automatic execution mechanisms, its confirmed functionality indicates a potential for broader deployment. Security experts advise that the script may still be in testing but could soon be used in larger-scale operations.

The infection begins when the script is manually run, querying the Telegram Bot API and retrieving bot telemetry. After identifying Telegram installations, the script forcefully closes Telegram processes to unlock session files before compressing them. It then uploads the archive to the operator via the bot API, with a fallback method to ensure delivery. The script deletes any evidence post-upload to avoid detection.

For immediate protection, users should terminate all active Telegram sessions, change passwords, enable two-factor authentication, and review account activities. Network administrators should block specific domains or monitor unusual API calls to prevent further breaches.

Stay informed on cybersecurity updates by following us on Google News, LinkedIn, and X. Mark CSN as a preferred source on Google for instant updates.

Cyber Security News Tags:account security, bot API, Cybersecurity, data exfiltration, Flare analysts, Malware, network protection, Pastebin, PowerShell, script analysis, security threat, session data, session stealer, Telegram, two-factor authentication

Post navigation

Previous Post: US-Linked Malware ‘Fast16’ Uncovered in Early Cyber Tensions
Next Post: NASA Targeted in Chinese Phishing Attack on Defense Software

Related Posts

6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability 6000+ Vulnerable SmarterTools SmarterMail Servers Exposed to Actively Exploited RCE Vulnerability Cyber Security News
Critical Vulnerability in CrowdStrike LogScale Exposed Critical Vulnerability in CrowdStrike LogScale Exposed Cyber Security News
Google Announces 10 New AI Features for Google Chrome Powered by Gemini Google Announces 10 New AI Features for Google Chrome Powered by Gemini Cyber Security News
Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks Cyber Security News
Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System Eaton Vulnerabilities Let Attackers Execute Arbitrary Code On the Host System Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Desktop Raises Privacy Concerns with Browser Integration
  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Desktop Raises Privacy Concerns with Browser Integration
  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark