New ResokerRAT Uses Telegram Bot API to Control Infected Windows Systems

By Published On: April 6, 2026

The digital landscape is a constant battleground, and sophisticated threats emerge with alarming frequency. Recently, a new and insidious Remote Access Trojan (RAT) has surfaced, leveraging a seemingly benign and widely used platform for its malicious operations. This threat, dubbed ResokerRAT, weaponizes Telegram’s Bot API to establish covert command-and-control (C2) channels, allowing attackers to maintain persistent access and exfiltrate sensitive data from compromised Windows systems. Understanding its modus operandi is crucial for bolstering our collective defenses against this evolving form of cyber espionage.

ResokerRAT: A New Breed of Telegram-Powered Malware

ResokerRAT distinguishes itself from traditional malware by eschewing custom C2 servers for a more discreet and trusted communication pathway: the Telegram Bot API. This method presents significant challenges for detection and mitigation. Instead of flagging suspicious traffic to obscure IP addresses, network defenders must now contend with malicious activity masquerading as legitimate Telegram communications. The attackers exploit Telegram’s robust infrastructure and the widespread use of its Bot API to seamlessly send commands to infected machines and receive stolen data, effectively hiding in plain sight.

This approach makes it significantly harder for conventional security solutions to identify and block the malvertising. The traffic generated by ResokerRAT appears to be legitimate interactions with Telegram, a platform trusted by millions for communication. This innovative evasion technique underscores the adaptability of threat actors and their continuous search for new ways to circumvent security measures.

How ResokerRAT Operates: The Attack Chain

The attack vector for ResokerRAT typically begins with standard social engineering tactics, aiming to trick users into executing the initial payload. Once a Windows system is compromised, ResokerRAT establishes a persistent connection to a pre-configured Telegram bot. This bot then acts as the central hub for all malicious activity. The stages of operation usually involve:

  • Initial Infection: Often through phishing emails with malicious attachments, drive-by downloads, or compromised software.
  • Persistence Mechanism: ResokerRAT implements mechanisms to ensure it restarts upon system reboot, maintaining control over the infected machine.
  • Telegram C2 Setup: The RAT registers itself with a specific Telegram bot token, allowing it to “listen” for commands and “report” back to the attacker’s Telegram account.
  • Command Execution: Attackers send commands via the Telegram bot interface. These commands can range from file exfiltration to remote desktop control.
  • Data Exfiltration: Stolen data, such as documents, credentials, or screenshots, is then packaged and sent back to the attacker via the same Telegram bot, often disguised as regular file transfers.

The Allure of Telegram Bot API for Threat Actors

The choice of Telegram’s Bot API is not accidental. It offers several compelling advantages for cybercriminals:

  • Ubiquity and Trust: Telegram is a widely adopted messaging platform, making its traffic less likely to be scrutinized by network security solutions.
  • Encryption: While end-to-end encryption for secret chats is a hallmark of Telegram, bots typically communicate via server-side encryption with the Telegram API. However, this still provides a layer of obfuscation for the malicious traffic.
  • Ease of Use: The Bot API is well-documented and relatively easy to implement, lowering the barrier to entry for even less sophisticated attackers.
  • Decentralization (to an extent): While the C2 traffic flows through Telegram’s servers, the attackers do not need to host and maintain their own vulnerable server infrastructure, reducing their operational footprint and cost.
  • Difficult Attribution: Tracing the ultimate source of the commands can be challenging, as the Telegram bot acts as an intermediary.

Remediation Actions and Proactive Defense

Protecting against sophisticated threats like ResokerRAT requires a multi-layered approach focusing on prevention, detection, and rapid response.

  • Employee Training and Awareness: Educate users about phishing, social engineering tactics, and the dangers of opening unsolicited attachments or clicking suspicious links. User vigilance remains a critical first line of defense.
  • Endpoint Detection and Response (EDR) Solutions: Deploy EDR solutions capable of monitoring system behavior, identifying anomalous processes, and flagging suspicious network connections, even if they appear to be legitimate Telegram traffic.
  • Network Traffic Analysis: Implement deep packet inspection and behavioral analysis on network traffic. Look for unusual patterns in Telegram API usage, such as excessive data transfers or interactions from unprovisioned bots.
  • Principle of Least Privilege: Limit user permissions to only what is necessary for their job functions. This can minimize the impact of an infection.
  • Regular Software Updates: Ensure operating systems, applications, and security software are routinely patched to address known vulnerabilities. While ResokerRAT isn’t tied to a specific CVE (as it exploits a legitimate API), keeping systems up-to-date reduces other potential infection vectors.
  • Strong Antivirus/Anti-Malware: Maintain up-to-date antivirus and anti-malware software with next-gen capabilities that can detect polymorphic threats and behavioral anomalies.
  • Application Whitelisting: Consider implementing application whitelisting to prevent unauthorized executables from running on endpoints.

Conclusion

The emergence of ResokerRAT serves as a stark reminder that cyber adversaries are constantly innovating, leveraging widely trusted platforms for their clandestine operations. The use of Telegram’s Bot API by this new RAT highlights the critical need for organizations to evolve their security strategies beyond traditional signature-based detection. By focusing on comprehensive endpoint protection, robust network monitoring, and continuous user education, organizations can significantly improve their resilience against this new breed of sophisticated, communication-channel-agnostic malware.

Share this article

Leave A Comment