{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiescoeu6w272wcboga3km44wglsfoyb3sjfmsl2cqjavkze3xuw6i",
    "uri": "at://did:plc:udsddln6gss4o4oazy7l4qpu/app.bsky.feed.post/3mhmkau652o62"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigzftadwscfndycf5t7qtaoe4iokeupchjc3yoppw4w24h7avuc2i"
    },
    "mimeType": "image/png",
    "size": 2628751
  },
  "path": "/iran-mois-telegram-c2-malware-campaign-fbi-flash-2026/",
  "publishedAt": "2026-03-21T00:00:00.000Z",
  "site": "https://securitycareers.help",
  "textContent": "A newly released FBI FLASH advisory details how Iranian MOIS cyber actors weaponized Telegram bots as C2 infrastructure to deliver surveillance malware against dissidents and journalists worldwide — a tradecraft case study every threat intel analyst and incident responder should study.",
  "title": "FBI FLASH: Iran's MOIS Is Using Telegram as a Malware Command Center — Here's What Security Pros Need to Know"
}