Iranian state-sponsored hackers are weaponizing Telegram to deploy malware in targeted attacks against dissidents, opposition groups, and journalists critical of Tehran's regime, the FBI warned today. The federal agency's alert marks a significant escalation in how authoritarian governments are exploiting encrypted messaging platforms - typically considered safe havens for activists - to conduct surveillance and data exfiltration operations against their perceived enemies.
The FBI is sounding the alarm on a troubling new tactic from Iranian state-sponsored hackers who've figured out how to turn Telegram - the encrypted messaging app beloved by privacy advocates - into a weapon for surveillance and data theft.
According to the bureau's warning, hackers working for Iran's government are actively using the platform to deploy malware in targeted operations against dissidents, opposition groups, and journalists who dare to criticize Tehran's regime. It's a brazen exploitation of the very tools activists rely on to communicate safely.
The timing is significant. Iran has ramped up its digital offensive capabilities over the past few years, with multiple threat groups linked to the Islamic Revolutionary Guard Corps conducting increasingly sophisticated operations. This latest campaign shows how state actors are adapting their playbooks, moving beyond traditional phishing emails to infiltrate platforms where targets feel most secure.
Telegram's popularity among dissidents and activists makes it an obvious target. The platform's encryption and relatively lax content moderation have made it a go-to communication channel for Iranian opposition groups coordinating protests and sharing information about government crackdowns. Now, that same openness is being exploited.
While the FBI didn't reveal specific technical details about how the malware is being distributed - likely to avoid tipping off the attackers - security researchers familiar with Iranian hacking operations say the tactics probably involve social engineering. Hackers typically pose as fellow activists or journalists, building trust over days or weeks before sending malicious files disguised as documents, images, or videos.
Once installed, the malware can exfiltrate messages, contacts, location data, and other sensitive information. For dissidents operating under constant threat of arrest or worse, that kind of compromise can be devastating. It's not just about digital privacy - it's about physical safety.












