From zdnet.com
![](https://www.zdnet.com/a/hub/i/r/2021/04/23/eecfcd9b-021e-4107-90da-8fd7114d0c74/thumbnail/770x578/5b618258f05436432eb75e81ae6a33f9/screenshot-2021-04-23-at-07-57-44.png)
Operators of a new Remote Access Trojan (RAT) are exploiting the Telegram service to maintain control of their malware.
Dubbed ToxicEye, the RAT abuses Telegram as part of command-and-control (C2) infrastructure in order to conduct rampant data theft.
On Thursday, Omer Hofman from Check Point Research said in a blog post that the new remote malware has been observed in the wild, with over over 130 attacks recorded in the past three months.