The vx-underground Threat Intelligence Discord Bot gets updates from various clearnet domains, ransomware threat actor domains, and Telegram channels. This bot will check for updates in intervals of 1800 seconds (omit Telegram bot, this is gotten in real time).
- Written in Python 3.10 64bit
- Can run on Windows or Linux
- Requires Discord Webhook
- Easily add or remove domains wanting to be monitored
- Written by a C++ Windows programmer, variable and function naming convention will probably make you puke
- 2 Scripts are present, 1 is responsible for ransomware groups and clearnet domains. The other is responsible for handling Telegram channels.
- Step 1. Make a web hook. Not sure how to make a webhook? Discord makes it easy!
- Step 2. Create the config.txt file. This config.txt stores when data was recently updated. If a value has a "?" this means it has never received an update and/or is a new entry. The configuration file path is specified at the beginning of the python script.
- Step 2a. If you'd like to monitor Telegram channels, you will need a Telegram API Key
- Step 3. Have internet connection
- Step 3a. If you're running the Telegram channel monitor, please note it downloads images from the Telegram channel. Sufficient hard disk space will be required to store images
- Step 4. Run the script
- By default this script requires 4 discord web hooks (5 in total if you decide to use the Telegram bot). It pipes output for private sector updates, governments updates, ransomware group updates, and log output to indicate whether or not it is running. Feel free to remove whatever, or add whatever
- Some Rss Feeds (such as Cybersecurity AT&T) have non-default RSS field keys. Some may require debugging to determine which fields are labeled as such. We simply removed these domains from the configuration file. We were too lazy to resolve this.
- There is no way to ensure what images are being posted to the Telegram channels. Proceed with caution
- This bot does not download file attachments (i.e. binaries, zip files, etc.) from Telegram channels. There is no way to determine what it is (reliably).
- On initial run the Telegram bot will send a 2FA message. This script handles this appropriately and will ask you to verify your identity by entering the code generated by Telegram
- This bot will not send re-join requests on each run. When the script runs a session file is created in the directory it is operating out of. This will save its current state within the specified Telegram channels
All monitored RSS feeds are in the RssFeedList object. To add a new RSS feed simply append a new entry and assign it a config.txt file entry name. e.g.
In the Python script:
RssFeedList = [["https://grahamcluley.com/feed/", "Graham Cluley"],
["https://1337WebsiteIWannaFollow.com/feed/", "1337Website"]]
In the config file:
1337Website = ?
The "?" indicates it has never received an update.
- NOTE: The Telegram API is an ugly monster and does not make determining what is being filtered an easy task. This script contains A LOT of repetitive code. Perhaps clean it up and send a merge request? =D
- Step 1. Set the image download path in the python script && set the Discord web hook URL
- Step 2. Retrieve the Telegram channel entity via
NewTelegramChannelName = TelegramClientObject.get_entity("https://t.me/TelegramChannelLink")
- Step 3. Send a join request when the application launches via
TelegramClientObject(JoinChannelRequest(NewTelegramChannelName))
- Step 4. Set the Telegram async filter via
##****NewTelegramChannelName handler****
@TelegramClientObject.on(events.NewMessage(incoming=True,chats=NewTelegramChannelName))
async def EventHandler(EventObject):
if EventObject.photo:
ImageData = await EventObject.download_media(DownloadPath)
UploadFile = discord.File(open(ImageData, 'rb'))
TelegramFeed.send(file=UploadFile)
CreateTelegramMessageOutput("NewTelegramChannelName", EventObject.message.message)
This was made by smelly__vx over a slow and boring weekend. We hope it provides some value to your channel and/or organization.