Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ResokerRAT Exploits Telegram API for Covert Control on Windows

ResokerRAT Exploits Telegram API for Covert Control on Windows

Posted on April 6, 2026 By CWS

A new cyber threat named ResokerRAT is targeting Windows systems, utilizing Telegram’s Bot API to covertly manage infected devices. This Remote Access Trojan (RAT) bypasses traditional detection methods by routing communication through a trusted messaging service, complicating detection and mitigation efforts.

Innovative Malware Communication Strategies

ResokerRAT distinguishes itself by leveraging a trusted platform, Telegram, for its command-and-control operations. Unlike typical malware that relies on custom servers, this approach allows it to blend with normal web traffic, avoiding detection by security tools. This strategic choice makes it a formidable threat as it remains hidden within legitimate network traffic.

The Trojan is equipped with numerous malicious features such as screen capturing, keylogging, and the ability to escalate privileges. It also disables Task Manager and downloads additional harmful software, operating silently on the compromised system.

Technical Insights into ResokerRAT

Research conducted by K7 Security Labs highlighted the technical sophistication of ResokerRAT. Detailed in a report published on March 30, 2026, the malware begins its operations as soon as its executable, Resoker.exe, is launched. It performs a series of checks and employs evasion tactics before engaging with the attacker’s Telegram bot.

The malware’s behavior includes using Windows API calls and PowerShell commands to perform actions discreetly. It ensures only a single instance runs by creating a specific mutex and disrupts analysis by detecting debuggers, using custom exception handling to evade them.

ResokerRAT’s Stealth Tactics

ResokerRAT seeks administrative privileges, using the ShellExecuteExA function with the ‘runas’ option to gain full control over the infected system. It actively scans for and terminates analysis tools like Task Manager to prevent detection.

Furthermore, it implements a global keyboard hook, effectively disabling common shortcuts and trapping users within the infected session. This malware uses Telegram’s Bot API for its command-and-control channel, constructing URLs with embedded bot tokens and chat IDs. This traffic is camouflaged as regular Telegram communication, as observed in network analyses.

ResokerRAT’s command abilities include capturing screenshots, modifying startup programs to ensure persistence, downloading files, and altering User Account Control settings to reduce security prompts.

Preventive Measures and Security Recommendations

To protect against threats like ResokerRAT, users should avoid downloading executables from untrusted sources. Organizations must ensure their Windows systems and security software are up to date to patch vulnerabilities that malware exploits. Network administrators should closely monitor connections to Telegram API endpoints for unusual activity.

Implementing restrictive PowerShell execution policies and deploying endpoint detection tools are crucial steps in identifying and halting such threats before they inflict significant harm.

Stay informed on cybersecurity developments by following updates on Google News, LinkedIn, and other platforms.

Cyber Security News Tags:cyber defense, cyber threats, Cybersecurity, data protection, endpoint security, firewall protection, K7 Security Labs, malware analysis, network monitoring, network security, PowerShell malware, remote access trojan, ResokerRAT, Telegram API, Windows malware

Post navigation

Previous Post: Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers
Next Post: BKA Unveils Key Figures in REvil Ransomware Operations

Related Posts

BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
MacOS Users Targeted by New Phishing Email Scam MacOS Users Targeted by New Phishing Email Scam Cyber Security News
Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Open Source Firewall OPNsense 25.7.11 Released With Host Discovery Service Cyber Security News
CamelClone Espionage Targets Governments via File-Sharing CamelClone Espionage Targets Governments via File-Sharing Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News
Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Claude Code Vulnerability Risks Developer Security
  • AI-Driven Penetration Testing Tool Enhances Linux Security
  • BKA Unveils Key Figures in REvil Ransomware Operations
  • ResokerRAT Exploits Telegram API for Covert Control on Windows
  • Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Claude Code Vulnerability Risks Developer Security
  • AI-Driven Penetration Testing Tool Enhances Linux Security
  • BKA Unveils Key Figures in REvil Ransomware Operations
  • ResokerRAT Exploits Telegram API for Covert Control on Windows
  • Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark