A recent discovery has revealed a GitHub repository advertising a Telegram channel that shares a variety of Remote Access Trojans (RATs).
These malicious tools include CraxRAT, Spyroid RAT, 88RAT, G-700RAT, and others, posing significant risks to cybersecurity.
The repository, hosted on GitHub under the alias “zimlog,” links directly to a Telegram channel where these RATs are distributed.
While the repository is being touted as a resource for malware analysts, its accessibility raises concerns about misuse by cybercriminals.
The Rise of RATs: A Growing Cybersecurity Threat
According to the post from Cyberfeeddigest, Remote Access Trojans (RATs) have become increasingly sophisticated and prevalent in recent years.
Tools like CraxRAT and G-700RAT are particularly concerning due to their advanced functionalities.

For instance, CraxRAT enables complete remote control over infected devices and has been linked to fake app scams and banking fraud.
Its developer, known as “EVLF,” has actively promoted the tool on Telegram channels, even sharing tutorials in multiple languages to expand its reach.
Similarly, G-700RAT represents an evolved variant of CraxRAT with enhanced capabilities such as privilege escalation, phishing attacks, and malicious APK distribution.
This malware specifically targets Android devices and cryptocurrency applications, making it a preferred choice among cybercriminals.
Distributed through underground forums and Telegram channels, G-700RAT highlights the growing sophistication of RAT-based attacks.
Telegram’s Role in Malware Distribution
Telegram has emerged as a key platform for distributing RATs due to its anonymity features and bot API capabilities.
Several RATs, including CodeRAT and RATAttack, utilize Telegram channels for command-and-control operations.
These tools allow attackers to manage infected devices remotely by embedding Telegram bot tokens into their configurations.
This method not only simplifies communication but also bypasses traditional security measures by leveraging encrypted messaging protocols.
The use of Telegram extends beyond communication; it also serves as a marketplace for malware distribution.
Threat actors frequently advertise their tools on Telegram channels, sharing links to GitHub repositories or underground forums where these RATs can be downloaded.
This trend underscores the urgent need for enhanced monitoring of such platforms to prevent misuse.
The exposure of this GitHub repository and its associated Telegram channel highlights the dual-edged nature of open-source platforms in cybersecurity.
While they can serve as valuable resources for researchers and analysts, they also provide opportunities for malicious actors to exploit vulnerabilities.
As RATs continue to evolve in complexity and distribution methods, organizations must adopt robust security measures, including threat intelligence and user awareness training, to mitigate these risks.
Also Read: