{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiescoeu6w272wcboga3km44wglsfoyb3sjfmsl2cqjavkze3xuw6i",
"uri": "at://did:plc:udsddln6gss4o4oazy7l4qpu/app.bsky.feed.post/3mhmkau652o62"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigzftadwscfndycf5t7qtaoe4iokeupchjc3yoppw4w24h7avuc2i"
},
"mimeType": "image/png",
"size": 2628751
},
"path": "/iran-mois-telegram-c2-malware-campaign-fbi-flash-2026/",
"publishedAt": "2026-03-21T00:00:00.000Z",
"site": "https://securitycareers.help",
"textContent": "A newly released FBI FLASH advisory details how Iranian MOIS cyber actors weaponized Telegram bots as C2 infrastructure to deliver surveillance malware against dissidents and journalists worldwide — a tradecraft case study every threat intel analyst and incident responder should study.",
"title": "FBI FLASH: Iran's MOIS Is Using Telegram as a Malware Command Center — Here's What Security Pros Need to Know"
}