How Adversary Telegram Bots Help to Reveal Threats: Case Study
This analysis examines a phishing campaign targeting Italian and US users, focusing on credential harvesting for Microsoft services and Italy's PEC system. The attackers use Notion workspaces and other cloud platforms to host phishing pages, exfiltrating stolen data via Telegram bots. The campaign, active since 2022, employs simple techniques and off-the-shelf tools, suggesting either low technical expertise or a focus on access brokering. The study demonstrates how intercepting Telegram bot communications can aid in profiling threat actors and provides insights into the campaign's evolution, victimology, and attacker characteristics.
Pulse ID: 682e044167e773f503da5a37
Pulse Link: https://otx.alienvault.com/pulse/682e044167e773f503da5a37
Pulse Author: AlienVault
Created: 2025-05-21 16:50:09
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Cloud #CredentialHarvesting #CyberSecurity #ELF #ICS #InfoSec #Italian #Italy #Microsoft #OTX #OpenThreatExchange #Phishing #RAT #RCE #Telegram #bot #AlienVault