A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control

Authors

  • Pham Van Toi
  • Nguyen Trung Dung
  • Hoang Linh Phuong
  • Nguyen Huu Long

DOI:

https://doi.org/10.54654/isj.v2i25.1102

Keywords:

social media, command and control, botnet, information security

Tóm tắt

In this study, we analyze how Telegram Bots can be abused as a Command and Control (C2) infrastructure in cyberattacks. We propose a Telegram-based C2 model that enables attackers to control compromised systems without relying on a centralized server, thereby enhancing anonymity and evasion capabilities. Furthermore, we introduce detection and defense strategies based on network behavior monitoring and encrypted message analysis.

Downloads

Download data is not yet available.

References

M. J. Freedman, “Using Weblogs to Track and Analyze Internet Abuse, First Monday”, Vol. 7, No. 10, October 2002, Available at: https://firstmonday.org/ojs/index.php/fm/article/view/1057.

P. Agarwal, S. Nagaraja, P. Piyawongwisal, A. Houmansadr, V. Singh, N. Borisov, “Stegobot, A Covert Social Network Botnet”, Proceedings of the International Workshop on Information Hiding, Prague, Czech Republic, May 2011, pp. pp 200  313.

E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. Anagnostakis, E. Markatos, Antisocial Networks: Turning a Social Network into a Botnet, ISC 2008, LNCS, Vol. 5222, Springer, Heidelberg, 2008, pp. 146–160.

D. Jaeger, M. Ussath, F. Cheng, C. Meinel, “Advanced Persistent Threats: Behind the Scenes”, Proceedings of the Annual Conference on Information Science and Systems (CISS), Princeton, USA, 2016, pp. 181  186.

H. Bos , C. J. Dietrich, F. C. Freiling, M. van Steen, C. Rossow, N. Pohlmann, “On Botnets that Use DNS for Command and Control”, Proceedings of the 7th European Conference on Computer Network Defense, Gothenburg, Sweden, September 2011, pp. 5  19.

S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy”, Advances in Computers, Vol. 62, 2004, pp. 1–94.

F. Brezo, J. G. Puerta, I. Santos, D. Barroso, P. G. Bringas, “C&C Techniques in Botnet Development”, Proceedings of the International Joint Conference CISIS’12-ICEUTE’12 SOCO’12, Ostrava, Czech Republic, 2012, pp. 97  108.

C. A. Visaggio, T. H. Austin, I. K. Makkar, F. Di Troia, M. Stamp, “SocioBot: A Twitter Based Botnet”, International Journal of Security and Networks, Vol. 12, No. 1, March 2017, pp. 1  20.

J. Balatzar, J. Costoya, R. Flores, “The Real Face of Koobface: The Largest Web 2.0 Botnet Explained”, Technical Report, Trend Micro, 2009.

P. Agarwal, S. Nagaraja, P. Piyawongwisal, A. Houmansadr, V. Singh, N. Borisov, “Stegobot: A Covert Social Network Botnet”, Proceedings of the International Workshop on Information Hiding, Prague, Czech Republic, May 2011, pp. pp 200  313.

J. R. Binkley, S. Singh, “An Algorithm for Anomaly-Based Botnet Detection”, Proceedings of the Symposium on Reducing Unwanted Traffic on the Internet (SRUTI), 2006.

J. Svoboda, I. Ghafir, V. Prenosil, “A Survey on Botnet Command and Control Traffic Detection”, International Journal of Advances in Computer Networks and Its Security, Vol. 5, No. 2, October 2015, pp. 30  80.

J. A. Morales, S. Xu, E. J. Kartaltepe, R. Sandhu, “Social Network-Based Botnet Command and-Control: Emerging Threats and Countermeasures”, Proceedings of the International Conference on Applied Cryptography and Network Security, Beijing, China, June 2010, pp. 500  628.

X. Jiang, J. Cao, Y. Ji, Y. He, Q. Li, “Combating the Evasion Mechanisms of Social Bots”, Computers & Security, Vol. 58, No. C, May 2016, pp. 200  349.

R. J. Deibert, R. Rohozinski, “Cyber-Warfare and the State: The Role of Cybersecurity in International Relations”, International Affairs, Vol. 86, No. 6, 2010, pp. 1325–1346.

Tuan, T. A., Cuong, N. N., Anh, N. V., & Long, H. V. (2023). Proposing the application of a deep learning model to detect the malicious IP address of botnet in the computer network. Journal of Science and Technology on Information Security, 3(17), 43-52. DOI: https://doi.org/10.54654/isj.v3i17.894.

A. Al-Bataineh, Y. Iraqi, “Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure”, Cardiff University, Technical Report, 2023.

P. Vilhan, P. Marko, “Efficient Detection of Malicious Nodes based on DNS and Statistical Methods”, Proceedings of the IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herl'any, Slovakia, January 2012, pp. 200  245.

Son, D. T., Tram, N. T. K., & Hieu, P. M. (2022). Deep Learning Techniques to Detect Botnet. Journal of Science and Technology on Information Security, 1(15), 85-91. DOI: https://doi.org/10.54654/isj.v1i15.846.

A. H. Toderici, K. Ross, A. Singh, M. Stamp, “Social Networking for Botnet Command and Control”, International Journal of Computer Network and Information Security, Vol. 5, No. 6, May 2013, pp. 5  20.

T. Holz, J. Göbel: Rishi, “Identify Bot Contaminated Hosts by IRC Nickname Evaluation”, Proceedings of the 1st Conference on First Workshop on Hot Topics in Understanding Botnets (HotBots’07), Cambridge, USA, April 2007, pp. 1  20.

A. Lehtiö: C&C-As-A-Service, “Abusing Third-Party Web Services as C&C Channels”, Proceedings of the 25th Virus Bulletin International Conference, Prague, Czech Republic, September 2015, pp. 200  321.

Palo Alto Networks, “Command and Control Explained, Cyberpedia”, Available at: https://www.paloaltonetworks.com/cyberpedia/command-and-control-explained.

T. Alsudais, “Cybersecurity Threats in the Healthcare Sector”, A Systematic Review, Information, Vol. 5, No. 1, Article 4, 2023, Available at: https://www.mdpi.com/2624-800X/5/1/4.

R. K. Mir, A. M. Lone, “Cybersecurity: Attacks and Defenses”, 2021 6th International Conference on Inventive Computation Technologies (ICICT), IEEE, pp. 1186–1190.

Splunk Security Research Team, “C2-Command and Control Explained”, Splunk Blog, April 2023, Available at: https://www.splunk.com/en_us/blog/learn/c2-command-and-control.html.

Sendmarc Security Blog, “Understanding the Steps in a Social Engineering Attack”, Sendmarc, March 2023, Available at: https://sendmarc.com/blog/understanding-the-steps-in-a-social-engineering-attack/.

Rapid7 Labs, “Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators”, Rapid7 Blog, May 2024.

Downloads

Abstract views: 61 / PDF downloads: 22

Published

2025-09-30

How to Cite

Toi, P. V., Dung, N. T., Phương, H. L., & Long, N. H. (2025). A Scalable Telegram-Based Botnet Framework for Stealthy Remote Command and Control . Journal of Science and Technology on Information Security, 2(25), 43-51. https://doi.org/10.54654/isj.v2i25.1102

Issue

Section

Papers