The FBI has issued a warning that Iranian-linked hackers are increasingly using the messaging platform Telegram to coordinate malware attacks and steal sensitive data.
According to officials, these cybercriminal groups are leveraging Telegram as a command-and-control (C2) channel, allowing them to manage attacks remotely while staying difficult to trace.
The alert highlights a growing trend in cyber warfare where attackers are using popular communication platforms to hide malicious activity, making detection and prevention more challenging.
How Hackers Are Using Telegram

Cybersecurity experts say attackers are using Telegram in multiple ways to execute their operations.
These include:
- Sending commands to infected devices
- Exfiltrating stolen data
- Managing malware campaigns remotely
- Communicating securely within hacking groups
Because Telegram offers encryption and bot-based automation, it has become an attractive tool for cybercriminals.
This allows attackers to operate covertly while maintaining real-time control over compromised systems.
What Kind of Malware Is Being Used

The FBI warning suggests that hackers are deploying different types of malware designed to infiltrate and exploit systems.
Common malware capabilities include:
- Stealing login credentials
- Capturing sensitive files
- Monitoring user activity
- Installing additional malicious software
Once a system is infected, the malware connects back to Telegram channels or bots, allowing attackers to control devices and extract data remotely.
Why Telegram Is Being Exploited

Telegram’s features make it useful not just for communication—but also for misuse.
Key reasons include:
- Encrypted messaging capabilities
- Bot creation for automation
- Easy file sharing
- Cross-platform accessibility
While these features are designed for privacy and convenience, attackers exploit them to coordinate cyberattacks and hide their activities.
Who Is at Risk

The attacks are not limited to a specific group of victims.
Potential targets include:
- Businesses and enterprises
- Government organizations
- Remote workers
- Individual users
Anyone who interacts with suspicious files or links could unknowingly become a victim of malware infection.
How to Protect Yourself from These Attacks

To stay safe, experts recommend taking proactive cybersecurity measures:
- Avoid clicking unknown links or downloading suspicious files
- Use strong and unique passwords
- Enable two-factor authentication
- Keep your software and devices updated
- Install reliable security tools
Awareness and caution are critical in preventing data theft and malware infections.
The Bigger Picture: Evolving Cyber Threats

This warning reflects a broader shift in cyber threats.
Modern attacks are becoming:
- More sophisticated
- Harder to detect
- Increasingly state-linked
- Dependent on everyday apps
Cybercriminals are adapting quickly, using widely available tools to blend in with normal user activity.
Final Thoughts
The FBI’s alert about hackers using Telegram highlights how cyber threats are evolving with technology.
As attackers continue to exploit common platforms, individuals and organizations must stay vigilant and informed.
By understanding these risks and adopting strong security practices, users can significantly reduce their chances of becoming victims.
In today’s digital world, staying secure online is more important than ever.
FAQ
What did the FBI warn about?
The FBI warned that Iranian-linked hackers are using Telegram to coordinate malware attacks and steal data.
How are hackers using Telegram?
They use it as a command-and-control system to manage infected devices and extract data.
What kind of malware is involved?
Malware that can steal credentials, monitor activity, and install additional threats.
Why is Telegram being targeted?
Its encryption, automation features, and global accessibility make it useful for attackers.
Who is at risk?
Businesses, government agencies, and everyday users can all be targeted.
How can I protect myself?
Avoid suspicious links, update your software, and use strong security practices.