
Summary
This detection rule is designed to identify suspicious requests made to the Telegram API that do not utilize the typical Telegram User-Agent. Given the popularity of the Telegram API for legitimate service use, malicious actors often disguise their activities when exploiting the API for command and control communications in various malware campaigns. This rule specifically looks for traffic to 'api.telegram.org' that does not match the expected User-Agent strings associated with Telegram applications and bots. By examining the conjunction of criteria specified in the rule, including client host, user-agent filtering, and the overall condition for selection versus filtering, security teams can better discern potentially harmful interactions with the Telegram API, thus enabling them to respond to threats more effectively.
Categories
- Network
- Cloud
- Web
- Endpoint
Data Sources
- Web Credential
- Network Traffic
- Firewall
- Application Log
Created: 2018-06-05