Iran-Linked Hackers Strengthen Malware Campaign via Telegram to Target Dissidents and Journalists
The recent Iran Telegram malware campaign underscores the evolving tactics of state-sponsored cyber actors, who are increasingly leveraging popular digital platforms to conduct surveillance and deploy malware. A recent alert from the Federal Bureau of Investigation (FBI) has revealed that cyber operatives associated with Iran’s Ministry of Intelligence and Security (MOIS) are utilizing Telegram as a command-and-control (C2) infrastructure for their malicious activities.
This campaign primarily targets Iranian dissidents, journalists, and individuals or groups viewed as adversaries to the Iranian government. The FBI has indicated that these operations have resulted in intelligence collection, data leaks, and reputational damage, suggesting that the intent extends beyond mere access to a sustained strategy of monitoring and impact.
Iran Telegram Malware Reflects Targeted Surveillance Strategy
The Iran Telegram malware activity has been traced back to at least Fall 2023, with various malware variants identified that specifically target Windows systems. The profile of victims is not random; it is meticulously crafted, focusing on individuals whose opinions or affiliations are perceived as threats by the Iranian authorities.
The FBI has also noted that the malware’s capabilities are not restricted to specific targets, implying a broader potential for misuse against any individual of interest. What is particularly alarming is the level of preparation involved. The malware is not merely deployed; it is customized. Attackers appear to conduct thorough reconnaissance on their targets, tailoring their lures to enhance the likelihood of success. This approach indicates a methodical, intelligence-driven strategy rather than opportunistic attacks.
How the Iran Telegram Malware Operates
The FBI outlines a structured, multi-stage malware framework that combines deception with persistence.
Social Engineering Drives Initial Access
Attackers initiate contact through messaging platforms, impersonating trusted contacts or technical support. Victims are often persuaded to download files disguised as legitimate applications. These files frequently resemble commonly used software, such as messaging tools or utilities, making them less likely to raise suspicion.
Multi-Stage Malware Deployment
- Stage 1: The malware masquerades as legitimate applications, including Telegram-related tools or KeePass.
- Stage 2: After user interaction, a persistent implant is installed.
Once executed, the second stage connects the compromised device to a Telegram bot, establishing a C2 channel via Telegram’s infrastructure.
Persistent Access and Control
At this stage, attackers gain remote access to the infected system. The use of Telegram facilitates bidirectional communication, allowing continuous control without drawing immediate attention.
Data Collection and Exfiltration via Telegram
The primary objective of the Iran Telegram malware campaign is data collection. The malware is capable of:
- Recording screen activity and audio.
- Capturing cached data and files.
- Compressing and staging data for exfiltration.
- Deleting files post-extraction.
Some variants are even designed to record screen and audio during active Zoom sessions, emphasizing a focus on capturing sensitive, real-time information. All collected data is routed through Telegram infrastructure, reinforcing its role as a central component of the attack chain.
Links to Handala Hack and Proxy Operations
The FBI has also connected this campaign to the online entity “Handala Hack,” which claimed responsibility for a 2025 hack-and-leak operation targeting individuals critical of Iran. The agency assesses that some of the leaked data was obtained using malware associated with this campaign. Handala Hack is known for phishing, data theft, extortion, and destructive cyber activities, including the deployment of wiper malware.
Additionally, the group is linked to “Homeland Justice,” another entity believed to be operated by MOIS cyber actors. This reflects a broader trend where technical intrusions are followed by public data exposure, aiming not just for access but also for reputational and political damage through controlled information release.
Execution Techniques and Persistence Mechanisms
The malware used in the Iran Telegram campaign employs several techniques to maintain access and avoid detection:
- Use of PowerShell execution without warnings.
- Registry modifications to ensure persistence.
- Deployment of multiple malware files for various functions.
Observed file names include variants that mimic legitimate tools, such as Telegram_authenticator.exe and WhatssApp.exe, further reinforcing the deception strategy.
Once inside a system, additional malware components are downloaded to expand capabilities and maintain long-term access.
Why This Campaign Stands Out
The Iran Telegram malware campaign is particularly concerning due to its combination of simplicity and precision.
- It relies heavily on human interaction rather than complex technical exploits.
- It utilizes trusted platforms instead of suspicious infrastructure.
- It targets specific individuals rather than conducting mass attacks.
This combination complicates detection efforts and increases the likelihood of successful infiltration.
Mitigation: Simple Steps, Critical Impact
Despite the sophistication of the campaign, the FBI’s recommendations remain rooted in basic cybersecurity practices:
- Be cautious of unexpected messages, even from known contacts.
- Avoid downloading files from unverified sources.
- Keep systems updated with the latest software patches.
- Use strong passwords and enable multi-factor authentication.
- Regularly run antivirus or anti-malware tools.
The advisory highlights that even advanced campaigns often succeed due to minor lapses in user awareness.
A Clear Signal for Cyber Defenders
The Iran Telegram malware campaign serves as a reminder that cyber threats are no longer confined to obscure or easily identifiable channels. By embedding malicious activity within widely used platforms like Telegram, attackers are reducing friction and enhancing stealth.
For defenders, this presents a significant challenge; security strategies must account not only for malicious code but also for the methods and platforms used for its delivery. The familiarity of the platform and the simplicity of the method are precisely what make this campaign effective.
According to publicly available reporting, the FBI’s insights into this campaign highlight the need for vigilance and adaptability in cybersecurity measures.
For the latest cybersecurity developments, threat intelligence, and breaking updates from across the Middle East: Middle East


