<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Telegram — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/telegram/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 31 Mar 2026 12:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/telegram/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenClaw Information Disclosure via Telegram Bot Token Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-03-openclaw-token-leak/</link><pubDate>Tue, 31 Mar 2026 12:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-openclaw-token-leak/</guid><description>OpenClaw before version 2026.3.13 exposes Telegram bot tokens in error messages due to the fetchRemoteMedia function embedding these tokens in MediaFetchError strings when media downloads fail.</description><content:encoded><![CDATA[<p>OpenClaw versions prior to 2026.3.13 are susceptible to an information disclosure vulnerability (CVE-2026-32982). The vulnerability resides within the <code>fetchRemoteMedia</code> function. When OpenClaw attempts to download media from Telegram and the download fails, the application generates an error message. Critically, the original Telegram file URL, which contains the Telegram bot token, is included in the <code>MediaFetchError</code> string. This error message is then logged and potentially displayed on error surfaces, leading to the exposure of sensitive bot tokens. This vulnerability was reported on March 31, 2026, and poses a risk to OpenClaw users who leverage Telegram bots, as compromised tokens could lead to unauthorized access and control of the bots.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an OpenClaw instance running a version prior to 2026.3.13.</li>
<li>The attacker crafts a malicious request that triggers the <code>fetchRemoteMedia</code> function to download a non-existent or inaccessible media file from Telegram.</li>
<li>The <code>fetchRemoteMedia</code> function attempts to download the media from the provided Telegram URL, which includes the bot token.</li>
<li>The download fails due to the file not being found or being inaccessible.</li>
<li>The <code>fetchRemoteMedia</code> function generates a <code>MediaFetchError</code> string that includes the original Telegram URL, containing the bot token.</li>
<li>This error message, including the Telegram bot token, is written to application logs or displayed on error surfaces (e.g., web interface).</li>
<li>An attacker gains access to the logs or error surfaces and extracts the Telegram bot token.</li>
<li>The attacker uses the compromised Telegram bot token to perform unauthorized actions via the Telegram bot, potentially leading to data theft, service disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32982 can lead to the exposure of Telegram bot tokens used by OpenClaw. Compromised bot tokens allow attackers to control the associated Telegram bots, potentially leading to unauthorized data access, message manipulation, or other malicious activities. The severity of the impact depends on the permissions and capabilities of the compromised bot. While the specific number of affected OpenClaw instances is unknown, any organization using OpenClaw with Telegram bot integration is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.13 or later to remediate CVE-2026-32982.</li>
<li>Review existing OpenClaw logs for any instances of <code>MediaFetchError</code> strings containing Telegram bot tokens.</li>
<li>Implement stricter access controls on OpenClaw logs to prevent unauthorized access to sensitive information.</li>
<li>Deploy the Sigma rule <code>Detect Telegram Bot Token Leak in Logs</code> to identify potential token exposure in log files.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>information-disclosure</category><category>vulnerability</category><category>telegram</category></item><item><title>Suspicious DNS Queries to Telegram API by Non-Telegram Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</guid><description>Detection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.</description><content:encoded><![CDATA[<p>This alert identifies systems querying the Telegram API domain (api.telegram.org) using processes other than the legitimate Telegram application. Threat actors frequently leverage Telegram bots for C2, due to their ease of use, encryption, and widespread availability. Malware can use these bots to receive commands, exfiltrate data, or perform other malicious activities. Detecting DNS queries for Telegram&rsquo;s API from unexpected processes can uncover compromised systems or unauthorized use of Telegram for covert communication. The detection focuses on non-standard Telegram clients resolving the api.telegram.org domain to filter out legitimate Telegram application traffic and focus on suspicious processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user inadvertently downloads and executes a malicious payload (e.g., via phishing or drive-by download).</li>
<li>The malware establishes persistence on the system (e.g., via registry keys or scheduled tasks).</li>
<li>The malware initiates a DNS query to resolve api.telegram.org to identify the Telegram API server IP address.</li>
<li>The malware establishes a communication channel with a Telegram bot controlled by the attacker using the resolved IP address.</li>
<li>The attacker sends commands to the bot, which are relayed to the compromised system.</li>
<li>The malware executes the received commands, potentially including data exfiltration or further malicious actions.</li>
<li>The malware exfiltrates sensitive data to the attacker via the Telegram bot.</li>
<li>The attacker maintains persistent access and control over the compromised system via the Telegram bot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be remotely controlled by attackers, leading to data theft, system disruption, or further propagation of malware within the network. The use of Telegram bots enables covert communication, making it difficult to detect malicious activity using traditional methods. Multiple threat actors employ Telegram-based C2, including those associated with information stealers, keyloggers, and crypto-mining malware. A successful attack can lead to significant data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Telegram DNS Queries</code> to your SIEM to identify processes making DNS queries to the Telegram API (api.telegram.org) other than the legitimate Telegram application.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution history, network connections, and related system activity.</li>
<li>Block the domain <code>api.telegram.org</code> at the DNS resolver or firewall to prevent compromised systems from communicating with Telegram bots, unless legitimate business use requires it.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to capture DNS query events on endpoints.</li>
<li>Update Sysmon to at least version 6.0.4 to ensure comprehensive DNS event logging.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>telegram</category><category>command-and-control</category><category>dns</category><category>windows</category></item></channel></rss>