Pull to refresh

Comments 2

Breaking news! Hackers use TCP/IP for crimes.
Telegram is just a tool. The same like a hammer. You can kill someone with a hammer or do something useful.
An attacker can customize the RAT (change an icon, add a certificate etc), then compile and send it as a phishing email attachement.

We can't defend ourselves from this shit.
Yes, you can do something useful, of course.
Buhtrap cyberteam were using a Teamviewer and PuntoSwitcher for their RAT. Does it mean that you do not need to know how to search and find these modules during the investigation?
Only those users with full accounts are able to leave comments. Log in, please.