Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

Detection of «Telegram Rat» virus

https://doi.org/10.21822/2073-6185-2024-51-1-79-86

Abstract

Objective. The aim of this study is to analyze the «Telegram Rat» virus, emphasizing the importance of awareness to effectively combat cyber threats and ensure security in the digital age.

Methods. This paper used an analysis of the characteristics and distribution of «Telegram Rat» viruses. An example of analyzing the technical mechanisms of extortion on the example of «WAGNER GROUP» was given and the steps of virus elimination were formulated.

Results. The acuality of the «Telegram Rat» virus problem and ways of its transmission are considered. Practical methods of threat detection and neutralization are stipulated. The method of «Telegram Rat» virus threat detection is based on the analysis of active processes, network activity and file system. It is revealed that the main vulnerability on devices infected with the virus is careless user behavior.

Conclusion. The contents of this paper emphasize the importance of vigilance when downloading files and clicking on links. Lack of caution can lead to data loss and information leakage, emphasizing the need for conscious behavior in the digital environment.

About the Authors

A. I. Dubrovina
Don State Technical University; Southern University (Institute of Management, Business and Law)
Russian Federation

Angelina I. Dubrovina, Assistant, Department of Computer Systems and Information Security 

1 Gagarin Square, Rostov-on-Don 344000, Russia 

130 Mechnikova St., Rostov-on-Don 344000, Russia 



M. H. Alkordi
Don State Technical University
Russian Federation

Mustafa Helmi Musa Alkordi, Student, Department of Computer Systems and Information Security

 1 Gagarin Square, Rostov-on-Don 344000, Russia 



References

1. DrKLO. 2013. Telegram messenger for Android. (Oct. 2013). https://github.com/DrKLO/Telegram.

2. Kara I., Aidos M. A ghost in the system: technical analysis of a remote access Trojan. International Journal on Information Technologies & Security. 2019; 11(1): 73-84.

3. Li X. et al. An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain. Security and Communication Networks. 2022;2022.

4. https://www.hindawi.com/journals/scn/2022/3111540/

5. Luo X. et al. Social engineering: The neglected human factor for information security management. Information Resources Management Journal (IRMJ). 2011; 24(3):1-8.

6. Chislova O., Sokolova M. Cybersecurity in Russia. International Cybersecurity Law Review. 2021; 2(2): 245-251.

7. Govender I., Watson B. W. W., Amra J. Global virus lockdown and cybercrime rate trends: A routine activity approach. Journal of Physics: Conference Series. IOP Publishing, 2021; 1828 (1): 012107.

8. Peeters S., Willaert T. Telegram and digital methods: Mapping networked conspiracy theories through platform affordances. M/C Journal. 2022;25(1): https://journal.mediaculture.org.au/index.php/mcjournal/article/view/2878.

9. Koutsokostas V. et al. Invoice# 31415 attached: Automated analysis of malicious Microsoft Office documents. Computers & Security. 2022;114:102582. https://www.mdpi.com/2076-3417/12/8/4088

10. Dubin R. Content Disarm and Reconstruction of RTF Files a Zero File Trust Methodology. IEEE Transactions on Information Forensics and Security.2023;18:1461-1472. https://ieeexplore.ieee.org/abstract/document/10034674/

11. Balikcioglu P. G. et al. Malicious code detection in android: the role of sequence characteristics and disassembling methods. International Journal of Information Security. 2023; 22 (1):107-118. https://link.springer.com/article/10.1007/s10207-022-00626-2

12. Acharya S., Rawat U., Bhatnagar R. A comprehensive review of android security: Threats, vulnerabilities, malware detection, and analysis. Security and Communication Networks. 2022;2022. https://www.hindawi.com/journals/scn/2022/7775917/

13. https://www.mdpi.com/2075-4698/12/6/164 Herrero-Solana V., Castro-Castro C. Telegram channels and bots: A ranking of media outlets based in Spain. Societies. 2022; 12(6):164.

14. Haagman D., Ghavalas B. Trojan defence: A forensic view. Digital Investigation. 2005; 2(1): 23-30.

15. Warrender C., Forrest S., Pearlmutter B. Detecting intrusions using system calls: Alternative data models. Proceedings of the 1999 IEEE symposium on security and privacy (Cat. No. 99CB36344). IEEE, 1999; 133-145.

16. Wu N., Qian Y., Chen G. A novel approach to trojan horse detection by process tracing. 2006 IEEE International Conference on Networking, Sensing and Control. IEEE, 2006: 721-726.

17. Ciubotariu M. What next? trojan. Linkoptimizer.Virus Bulletin. 2006: 6-10.

18. Mustafa Alkordi (2023). Ransomware Campaign Urges Resistance Against Russian Officials. URL: https://www.linkedin.com/pulse/ransomware-campaign-urges-resistance-against-russian-alkordi.

19. Kok S. et al. Ransomware, threat and detection techniques: A review //Int. J. Comput. Sci. Netw. Secur. – 2019;19(2): 136.https://seap.taylors.edu.my/file/rems/publication/105055_5256_1.pdf.

20. Tuma K., Calikli G., Scandariato R. Threat analysis of software systems: A systematic literature review. Journal of Systems and Software. 2018; 144: 275-294. https://www.sciencedirect.com/science/article/abs/pii/S0164121218301304

21. Zengy J. et al. Shadewatcher: Recommendation-guided cyber threat analysis using system audit records // 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022;489-506. https://www.sciencedirect.com/science/article/pii/S1319157821003621.


Review

For citations:


Dubrovina A.I., Alkordi M.H. Detection of «Telegram Rat» virus. Herald of Dagestan State Technical University. Technical Sciences. 2024;51(1):79-86. (In Russ.) https://doi.org/10.21822/2073-6185-2024-51-1-79-86

Views: 512


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)