Telegram Trouble: Malware Masquerades as Minecraft Client to Wreak Havoc on Gamers
A sneaky Python RAT is posing as a Minecraft client, “Nursultan Client,” to target gamers. Using the Telegram Bot API as its command center, it stealthily swipes Discord tokens, spies through webcams, and opens unwanted URLs. This malware is the perfect storm of gaming mischief and digital espionage.

Hot Take:
They say if you can’t beat them, join them. And it seems like cybercriminals have taken this advice to heart, infiltrating the gaming world with a new Python RAT named after a Minecraft client. It’s like trying to sneak into a concert with a fake VIP pass, except instead of music, you’re stealing Discord tokens and snapshots of someone’s desktop. The audacity! And using Telegram as a command and control channel? That’s like sending secret spy messages via Snapchat. It’s both genius and absurd. You almost have to admire the creativity, even if it does make you want to throw your computer out the window.
Key Points:
- Pretends to be a legitimate Minecraft client named “Nursultan Client” to trick victims.
- Leverages Telegram Bot API for C2 communications, making it a cross-platform threat.
- Targets Discord authentication tokens and includes surveillance features like screen capture.
- Designed with a flawed persistence mechanism, showing the author’s lack of sophistication.
- Exploits the gaming community’s penchant for mods and cheats as a social engineering tactic.
