CyberEye (aka TelegramRAT) is a .NET-based Remote Access Trojan (RAT) with modular capabilities designed for data theft, surveillance, and stealthy persistence. Built with a user-friendly GUI, it allows adversaries to generate customized payloads using a builder interface. It abuses Telegram Bot API for command-and-control, removing the need for attacker-owned infrastructure and making attribution and detection more difficult.
1. Threat Actor: Associated with aliases @cisamu123 and @CodQu, active on GitHub and Telegram
2. CyberEye RAT Capabilities:
3. Affected Regions: Asia-Pacific, Eastern Europe, South Asia, Middle East.
4. Affected Sectors: Government & Defense, Manufacturing, Telecom, Financial Services, Healthcare, Energy.
1. Delivery & Execution: CyberEYE is delivered through spear-phishing campaigns or malicious attachments, often masquerading as legitimate files. The attacker may also utilize cracked RAT builders or compromised sites to propagate the tool. Executed .exe file begins infection
2. Installation & Persistence: Drops itself into hidden %AppData% folder. Registers a scheduled task as “Chrome Update”. UAC bypass attempt if admin privileges required.
3. Command and Control: Establishes communication via Telegram Bot API. Waits for commands like /computerinfo, /keylogger_on, etc. Sends back stolen data (e.g., credentials, cookies, tdata folders).
4. Privilege Escalation: Built-in features such as UAC bypass modules allow privilege escalation for deeper system access. Uses system calls to relaunch itself with elevated privileges.
5. Defense Evasion: CyberEYE supports obfuscation, anti-VM/sandbox, anti-debugging, and encryption techniques to avoid detection. The builder enables creation of fully undetectable binaries (FUD).
6. Collection & Exfiltration: CyberEYE collects system information, browser data, screenshots, session tokens, webcam captures, and sensitive files. Compresses and sends stolen content via Telegram API. Monitors clipboard and hijacks crypto wallet addresses.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy