

 Tool: TeleBot
 Tool: TeleBot| Names | TeleBot | |
| Category | Malware | |
| Type | Backdoor | |
| Description | (ESET) Python/TeleBot abuses the Telegram Bot API from Telegram Messenger to communicate with the attackers. The Telegram Bot API is based on HTTP and to a network administrator within a compromised network, the communication between the infected computer and the attackers will look like HTTP(S) communication with a legitimate server. | |
| Information | <https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.telebot> | |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Previous: TechnoCreep
Next: TeleDoor
| Changed | Name | Country | Observed | ||
| APT groups | |||||
| TeleBots |  | 2015-Oct 2020 |  | ||
1 group listed (1 APT, 0 other, 0 unknown)
| Digital Service Security Center Follow us on    | Report incidents | |
|  | +66 (0)2-123-1227 | |
|  | [email protected] | |