ESET Research Podcast: Telekopye, again

ESET ResearchESET Research Podcast: Telekopye, again=======================================Take a peek into the murky world of cybercrime where groups of scammers who go by the nickname of ‘Neanderthals’ wield the Telekopye toolkit to ensnare unsuspecting victims they call ‘Mammoths’ [![ESET Research](https://web-assets.esetstatic.com/tn/-x45/wls/2022/03/twitter_profile_picture_400x400.png)](/en/our-experts/eset-research/ ‘ESET Research’) [**ESET Research**](/en/our-experts/eset-research/ ‘ESET Research’)20 Dec 2024 • , 1 min. read ![ESET Research Podcast: Telekopye, again](https://web-assets.esetstatic.com/tn/-x700/wls/2024/12-2024/eset-research-podcast-telekopye-again.jpeg) Neanderthals hunting Mammoths are back. Of course, we’re not talking about some Jurassic-Park-like technology that resurrected them in a remote region. No, this episode of ESET Research Podcast returns to the malicious operation of dozens of cybercriminal groups (Neanderthals) targeting inexperienced users (Mammoths) on online marketplaces, using a malicious Telegram bot known as Telekopye.Discussing the topic, ESET Research Podcast host [Aryeh Goretsky](https://www.welivesecurity.com/en/our-experts/aryeh-goretsky/), and ESET malware researchers, [Radek Jizba](https://www.welivesecurity.com/en/our-experts/radek-jizba/) and [Jakub Soucek](https://www.welivesecurity.com/en/our-experts/jakub-soucek/), [revisit](https://www.welivesecurity.com/en/eset-research/telekopye-hunting-mammoths-using-telegram-bot/) and [update](https://www.welivesecurity.com/en/eset-research/telekopye-hits-new-hunting-ground-hotel-booking-scams/) the information ESET has gathered about the cybercriminal ecosystem. Apart from that, they dive deep into the most frequent scenarios used by the attackers and map out the expanded hunting grounds of the Neanderthals.This podcast episode also offers technical details about the workings of the Telekopye bot and explains social engineering techniques employed by the scammers, so whether you’re a seasoned security professional or a casual listener, you’ll find valuable insights and practical advice on how to avoid the risk.In addition, our guests touch upon the recent operations ‘RIP’ and ‘Victory’ by Czech and Ukrainian police forces and evaluate their impact on cybercriminal groups.For more in-depth information about the Telekopye bot and the ‘Neanderthal’ operations, don’t forget to check out ESET’s [latest research papers](https://web-assets.esetstatic.com/wls/en/papers/white-papers/marketplace-scams.pdf). To stay up to date on the latest in security research, follow [ESET Research on X](https://x.com/esetresearch) and visit [WeLiveSecurity.com](http://welivesecurity.com/). If you enjoy the podcast, please subscribe for more on [Spotify](https://open.spotify.com/show/1WDjY2A3A3s5FKycrOVkhg), [Apple Podcasts](https://podcasts.apple.com/us/podcast/eset-research-podcast/id1596306608), or [PodBean](https://esetresearch.podbean.com/).*** ** * ** ***Let us keep youup to date—————————–Sign up for our newsletters Ukraine Crisis newsletter Regular weekly newsletter Subscribe #### Related Articles*** ** * ** ***[ESET Research, Threat ReportsESET Threat Report H2 2024![ESET Threat Report H2 2024](https://web-assets.esetstatic.com/tn/-x145/wls/2024/12-2024/eset-threat-report-h2-2024.jpeg)ESET Research, Threat ReportsESET Threat Report H2 2024](/en/eset-research/eset-threat-report-h2-2024/ ‘ESET Threat Report H2 2024’) *** ** * ** ***[ESET ResearchBootkitty: Analyzing the first UEFI bootkit for Linux![Bootkitty: Analyzing the first UEFI bootkit for Linux](https://web-assets.esetstatic.com/tn/-x145/wls/2024/11-2024/bootkitty/bootkitty-uefi-linux-backdoor.jpeg)ESET ResearchBootkitty: Analyzing the first UEFI bootkit for Linux](/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/ ‘Bootkitty: Analyzing the first UEFI bootkit for Linux’) *** ** * ** ***[ESET ResearchRomCom exploits Firefox and Windows zero days in the wild![RomCom exploits Firefox and Windows zero days in the wild](https://web-assets.esetstatic.com/tn/-x145/wls/2024/11-2024/firefox-windows-zero-days-romcom.jpeg)ESET ResearchRomCom exploits Firefox and Windows zero days in the wild](/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/ ‘RomCom exploits Firefox and Windows zero days in the wild’) ### Similar Articles[ESET researchTelekopye: Hunting Mammoths using Telegram bot![Telekopye: Hunting Mammoths using Telegram bot](https://web-assets.esetstatic.com/tn/-x82/wls/2023/2023-8/telekopye2.jpeg)](/en/eset-research/telekopye-hunting-mammoths-using-telegram-bot/ ‘Telekopye: Hunting Mammoths using Telegram bot’)*** ** * ** ***[ESET researchTelekopye: Chamber of Neanderthals’ secrets![Telekopye: Chamber of Neanderthals’ secrets](https://web-assets.esetstatic.com/tn/-x82/wls/2023/2023-11/telekopye-2-0/eset-threat-research-telekopye2.jpeg)](/en/eset-research/telekopye-chamber-neanderthals-secrets/ ‘Telekopye: Chamber of Neanderthals’ secrets’)*** ** * ** ***[ESET researchTelekopye transitions to targeting tourists via hotel booking scam![Telekopye transitions to targeting tourists via hotel booking scam](https://web-assets.esetstatic.com/tn/-x82/wls/2024/10-2024/telekopye/telekopye-booking-sites-fraud.jpeg)](/en/eset-research/telekopye-hits-new-hunting-ground-hotel-booking-scams/ ‘Telekopye transitions to targeting tourists via hotel booking scam’)*** ** * ** ***[ESET researchESET Research Podcast: Neanderthals, Mammoths and Telekopye![ESET Research Podcast: Neanderthals, Mammoths and Telekopye](https://web-assets.esetstatic.com/tn/-x82/wls/2023/2023-12/eset-research-podcast-neanderthals-telekopye.jpeg)](/en/podcasts/eset-research-podcast-neanderthals-mammoths-telekopye/ ‘ESET Research Podcast: Neanderthals, Mammoths and Telekopye’)*** ** * ** ***### Share Article[](https://www.facebook.com/sharer/sharer.php?u=https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/ ‘Facebook’) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/ ‘LinkedIn’) [](https://twitter.com/intent/tweet?url=https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/ ‘Twitter’) [](mailto:?&subject=I wanted you to see this site&body=https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/ ‘mail’) [](https://www.welivesecurity.com/en/podcasts/eset-research-podcast-telekopye-again/ ‘copy’) ![Apt Activity Report](https://www.welivesecurity.com/build/assets/eset-apt-activity-report-q2-2024-q3-2024-d75a59c4.webp) ### Discussion

Related Tags:
NAICS: 923 – Administration Of Human Resource Programs

NAICS: 45 – Retail Trade – Fuel

Other

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 51 – Information

Blog: ESET We Live Security

Associated Indicators: