Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telegram-Based ResokerRAT Threatens Windows Security

Telegram-Based ResokerRAT Threatens Windows Security

Posted on March 31, 2026 By CWS

A newly discovered remote access trojan, ResokerRAT, leverages Telegram’s bot API for covertly controlling infected Windows computers. This malware differentiates itself by circumventing traditional command-and-control servers, opting instead for a trusted messaging platform to transmit commands and retrieve stolen information. This tactic complicates detection efforts for conventional network security solutions.

Unconventional Communication Methods

Unlike typical malware, ResokerRAT exploits Telegram to establish its communication channel. By using the Telegram Bot API, the malware receives instructions and sends data back to its operators, making it challenging for security systems to recognize and block its activities. The trojan is delivered through an executable file named Resoker.exe, which, upon execution, initiates background operations such as establishing persistence and requesting elevated privileges.

Once active, ResokerRAT can perform a range of harmful tasks, including capturing screenshots, downloading further payloads, and disabling security notifications. Analysts from K7 Security Labs have identified its initial action as creating a mutex, ‘GlobalResokerSystemMutex,’ to ensure only one instance operates simultaneously. Additionally, the malware checks for debugger presence, interrupting analysis if detected.

Technical Tactics and Persistence

To extend its infiltration, ResokerRAT attempts to relaunch with administrative rights using the ‘runas’ option. If successful, it closes the original instance and resumes operation under elevated privileges. In failure cases, it reports errors back via the Telegram bot. The malware also terminates processes of common analysis tools, obstructing forensic efforts.

ResokerRAT’s persistence is achieved by embedding itself into the Windows registry under the ‘Run’ key, ensuring execution at startup. This method allows it to remain operational even after system reboots, with the malware confirming its startup configuration to the attacker through Telegram.

Security Recommendations and Precautions

Security experts advise monitoring for unauthorized registry entries and suspicious HTTPS traffic to ‘api.telegram.org’ as preventive measures against ResokerRAT. Ensuring systems are current with patches, avoiding untrusted executable files, and being vigilant for sudden Task Manager access issues are critical in mitigating infection risks.

In summary, ResokerRAT exemplifies a sophisticated cyber threat employing unconventional communication channels to evade detection. Continuous vigilance and proactive security practices are essential to safeguard systems against such evolving threats.

Cyber Security News Tags:command-and-control, Cybersecurity, malware detection, network security, persistence mechanisms, remote access trojan, ResokerRAT, screenshot capture, Telegram, Windows malware

Post navigation

Previous Post: Exploitation of Fortinet FortiClient Vulnerability Begins
Next Post: Security Flaw in Vertex AI Risks Google Cloud Data

Related Posts

Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds Cyber Security News
Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Hackers Exploit DNS Queries for C2 Operations and Data Exfiltration, Bypassing Traditional Defenses Cyber Security News
New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News
Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Microsoft SQL Server 0-Day Vulnerability Exposes Sensitive Data Over Network Cyber Security News
Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach Everest Ransomware Group Allegedly Exposes 343 GB of Sensitive Data in Major Under Armour Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Grafana Labs GitHub Breach: Codebase Compromised by Hackers
  • Grafana Suffers GitHub Token Breach, Faces Extortion
  • Public macOS Kernel Exploit Found on Apple M5 Chip
  • Critical Flaw in Funnel Builder Targets WooCommerce
  • JDownloader Site Incident: Malicious Installers Found

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark