Giter VIP home page Giter VIP logo

froggyfrog's Introduction

malware program that includes a back door for administrative control over the target computer using Telegram.

Features

  • WebCam
  • Threading
  • Tasklist
  • TaskKill
  • Easy for Beginners !

Installing

  • Just download. And write your token and chat id. run python3 main.py.
  • you will find a place to write token and id chat in main.py

How to get token?

Create a Telegram bot using BotFather and Get the Api Token.

  1. Open Telegram
  2. Search @ botfather
  3. Type /newbot .
  4. It will show “Alright, a new bot. How are we going to call it? Please choose a name for your bot.”
  5. Type the name of your bot.
  6. After, it’ll show “Good. Now let’s choose a username for your bot. It must end in bot. Like this, for example: TetrisBot or tetris_bot.”
  7. You’ve to give a unique username and it should be ending with bot.
  8. After giving the name it’ll show :- “Done! Congratulations on your new bot. You will find it at t.me/ShibinTest3bot. You can now add a description, about section and profile picture for your bot, see /help for a list of commands. By the way, when you’ve finished creating your cool bot, ping our Bot Support if you want a better username for it. Just make sure the bot is fully operational before you do this. Use this token to access the HTTP API: “TOKEN”
  9. Copy the Api Token for further.

For a description of the Bot API, see this page: https://core.telegram.org/bots/api

How Attackers Are Using Telegram to Control Malware

  • As early as 2017, attackers have been using Telegram to control malicious software from a distance. One notable example of this is the Masad Stealer program that emptied victims’ crypto wallets that year.
  • Check Point researcher Omer Hofman says that the company has found 130 ToxicEye attacks using this method from February to April of 2021, and there are a few things that make Telegram useful to bad actors who spread malware.
  • For one thing, Telegram isn’t blocked by firewall software. It also isn’t blocked by network management tools. It’s an easy-to-use app that many people recognize as legitimate, and thus, let their guard down around.
  • Registering for Telegram only requires a mobile number, so attackers can remain anonymous. It also lets them attack devices from their mobile device, meaning that they can launch a cyberattack from just about anywhere. Anonymity makes attributing the attacks to someone—and stopping them—extremely difficult.

froggyfrog's People

Contributors

yezz123 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.