Behind the Cheats: A Tale About the gready cheat developer
Everything from Two-Factor stealing to conflicts between operators, Telegram has been used for all.
Telegram as infrastructure isn’t new in the world of malware, but do you know what is ACTUALLY happening there?
In this talk, we will talk about the results of collecting over 1.5 thousand communication channels used by real threat actors.
We will discuss how it’s done, the different types of malware, and their targets, and share the technical analysis of the samples we have found.