FBI Says Iranian Hackers Are Using Telegram to Steal Data in Malware Attacks

FBI Says Iranian Hackers Are Using Telegram to Steal Data in Malware Attacks

TechCrunch (Cybersecurity)
TechCrunch (Cybersecurity)Mar 23, 2026

Why It Matters

State‑backed actors are using mainstream messaging platforms to hide malicious traffic, raising the threat level for activists and enterprises worldwide. The tactic complicates detection and underscores the need for robust, application‑layer security controls.

Key Takeaways

  • Iranian MOIS hackers exploit Telegram for command‑and‑control
  • Phishing links disguise as Telegram or WhatsApp apps
  • Malware enables file theft, screenshots, Zoom call capture
  • Handala group linked to Stryker device wipe attack
  • FBI seized two Handala and two Homeland Justice sites

Pulse Analysis

Telegram’s ubiquitous presence and encrypted traffic make it an attractive conduit for sophisticated threat actors. By embedding malicious payloads within seemingly legitimate app downloads, Iranian MOIS operatives bypass traditional perimeter defenses and establish a covert channel through Telegram bots. This method blends command‑and‑control traffic with everyday user communications, rendering network‑based detection tools less effective and forcing defenders to adopt behavior‑based analytics and endpoint monitoring to spot anomalies.

The fallout extends beyond individual activists; corporate environments are equally vulnerable. The recent Stryker breach, attributed to the Handala group, illustrates how state‑aligned hacktivists can scale attacks to target critical infrastructure and supply chains. Organizations must reassess their reliance on third‑party messaging apps, enforce strict application whitelisting, and implement multi‑factor authentication to mitigate credential‑theft vectors. Continuous threat‑intelligence feeds that flag emerging C2 platforms are essential for timely response.

Federal response underscores the geopolitical stakes of cyber‑espionage. The FBI’s seizure of Handala‑linked domains signals a willingness to disrupt the digital infrastructure supporting Iranian intelligence operations. Meanwhile, Telegram’s public stance on removing malware‑related accounts highlights the platform’s role in curbing abuse. As nation‑state actors continue to weaponize popular communication tools, a collaborative approach between governments, tech companies, and private security teams will be critical to safeguard free expression and corporate assets.

FBI says Iranian hackers are using Telegram to steal data in malware attacks

Comments

Want to join the conversation?

Loading comments...