Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
48 résultats taggé Telegram  ✕
Telegram, the FSB, and the Man in the Middle https://istories.media/en/stories/2025/06/10/telegram-fsb/
11/06/2025 16:22:18
QRCode
archive.org
thumbnail

The technical infrastructure that underpins Telegram is controlled by a man whose companies have collaborated with Russian intelligence services. An investigation by IStories

Telegram, the wildly popular chat and messaging app, is the pride of the Russian IT industry. According to Pavel Durov, the enigmatic entrepreneur who created the service twelve years ago, it now has over a billion monthly active users around the world.

Among the reasons for this success is Telegram’s reputation for security, coupled with Durov’s image as a free speech champion who has defied multiple governments.

“Unlike some of our competitors, we don’t trade privacy for market share,” he wrote this April. “In its 12-year history, Telegram has never disclosed a single byte of private messages.”

But IStories’ new investigation reveals a critical vulnerability.

When we investigated who controls the infrastructure that keeps Telegram’s billions of messages flowing, we found a man with no public profile but unparalleled access: Vladimir Vedeneev, a 45-year-old network engineer.

Vedeneev owns the company that maintains Telegram’s networking equipment and assigns thousands of its IP addresses. Court documents show that he was granted exclusive access to some of Telegram’s servers and was even empowered to sign contracts on Telegram’s behalf.

There is no evidence that this company has worked with the Russian government or provided any data. But two other closely linked Vedeneev companies — one of which also assigns Telegram IP addresses, and another which did so until 2020 — have had multiple highly sensitive clients tied to the security services. Among their clients is the FSB intelligence agency; a secretive “research computing center” that helped plan the invasion of Ukraine and developed tools to deanonymize internet users; and a flagship state-owned nuclear research laboratory.

Without you, there is no us
Support IStories — it helps us to continue telling the truth
Donate
“If true, this reporting highlights the dangerous disconnect between what many believe about Telegram’s security and privacy features, and the reality," said John Scott-Railton, a Senior Researcher at The Citizen Lab. "When people don't know what is actually going on, but assume they have metadata privacy, they can unknowingly make risky choices, bringing danger to themselves and the people they’re communicating with. This is doubly true if the Russian government sees them as a threat."

A Ukrainian IT specialist who spoke with IStories on condition of anonymity said that the Russian military has used “man-in-the-middle” type surveillance in his country after capturing network infrastructure.

"You get physical access to the data transmission channel and install your equipment there,” he said. “In such an attack, the hackers aren’t even interested so much in the user's correspondence. They get metadata to analyze. And that means IP addresses, user locations, who exchanges data packets with whom, the kind of data it is… really, all possible information.”

Durov is currently under investigation in France after being arrested last August on charges related to the circulation of illegal content on Telegram. The company has since implemented a number of measures to crack down and step up its collaboration with the authorities. Durov has been released under judicial supervision and is allowed to travel.

He did not reply to requests for comment. Vedeneev spoke with IStories but declined to make any of his comments public.

istories.media 2025 EN Telegram FSB Russia contrctor investigation
NGO warns FSB has gained access to Russians’ communication with Ukrainian Telegram channel bots — Novaya Gazeta Europe https://novayagazeta.eu/articles/2025/06/07/ngo-warns-fsb-has-gained-access-to-russians-communication-with-ukrainian-telegram-channel-bots-en-news
09/06/2025 23:43:53
QRCode
archive.org
thumbnail

Russia’s Federal Security Service (FSB) has learned to intercept messages sent by Russians to bots or feedback accounts associated with certain Ukrainian Telegram channels, potentially exposing anyone communicating with such outlets to treason charges, Russian human rights NGO First Department warned on Friday.

Russia’s principal domestic intelligence agency has gained access to correspondence made with Ukrainian Telegram channels including Crimean Wind and Vision Vishnun, according to First Department, which said that the FSB’s hacking of Ukrainian Telegram channels had come about during a 2022 investigation into the Ukrainian intelligence agencies “gathering information that threatens the security of the Russian Federation” via messengers and social networks including Telegram.

The case is being handled by the FSB’s investigative department, though no suspects or defendants have been named in the case, according to First Department.

When the FSB identifies individual Russian citizens who have communicated with or transmitted funds to certain Ukrainian Telegram channels, it contacts the FSB office in their region, which then typically opens a criminal case for treason against the implicated person.

“We know that by the time the defendants in cases of ‘state treason’ are detained, the FSB is already in possession of their correspondence. And the fact that neither defendants nor a lawyer are named in the main case allows the FSB to hide how exactly it goes about gaining access to that correspondence,” First Department said.

novayagazeta EN Russia Telegram FSB intercept
How Adversary Telegram Bots Help to Reveal Threats: Case Study  - ANY.RUN's Cybersecurity Blog https://any.run/cybersecurity-blog/adversary-telegram-bot-abuse
21/05/2025 13:17:49
QRCode
archive.org
thumbnail

Discover how to intercept data stolen by cybercriminals via Telegram bots and learn to use it to clarify related threat landscape.

While analyzing malware samples uploaded to ANY.RUN’s Interactive Sandbox, one particular case marked as “phishing” and “Telegram” drew the attention of our security analysts.

Although this analysis session wasn’t attributed to any known malware family or threat actor group, the analysis revealed that Telegram bots were being used for data exfiltration. This led us to apply a message interception technique for Telegram bots, previously described on the ANY.RUN blog.

The investigation resulted in a clear and practical case study demonstrating how intercepting Telegram bot communications can aid in profiling the threat actor behind a relatively obscure phishing campaign.

Key outcomes of this analysis include:

Examination and technical analysis of a lesser known phishing campaign
Demonstration of Telegram API-based data interception techniques
Collection of threat intelligence (TI) indicators to help identify the actor
Recommendations for detecting this type of threat

any.run EN 2025 Telegram analysis malware indicators bots
npm Malware Targets Telegram Bot Developers with Persistent SSH Backdoors https://socket.dev/blog/npm-malware-targets-telegram-bot-developers
21/04/2025 09:18:28
QRCode
archive.org
thumbnail

Malicious npm packages posing as Telegram bot libraries install SSH backdoors and exfiltrate data from Linux developer machines.

socket.dev EN 2025 Telegram bot libraries SSH backdoors npm Supply-Chain-Attack
Hackers breach Morocco's social security database in unprecedented cyberattack https://www.euronews.com/2025/04/10/hackers-breach-moroccos-social-security-database-in-unprecedented-cyberattack
13/04/2025 10:43:47
QRCode
archive.org
thumbnail

The hackers who posted the documents on Telegram said the attack was in response to alleged Moroccan 'harassment' of Algeria on social media platforms, pledging additional cyberattacks if Algerian sites were targeted.

euronews EN 2025 Algeria Morocco Western-Sahara Telegram Data-Leak Social-Security-Number
Inside FireScam : An Information Stealer with Spyware Capabilities https://www.cyfirma.com/research/inside-firescam-an-information-stealer-with-spyware-capabilities/
12/01/2025 21:05:08
QRCode
archive.org
thumbnail
  • FireScam is an information stealing malware with spyware capabilities.
    It is distributed as a fake ‘Telegram Premium’ APK via a phishing website hosted on the GitHub.io domain, mimicking the RuStore app store.
  • The phishing website delivers a dropper that installs the FireScam malware disguised as the Telegram Premium application.
  • The malware exfiltrates sensitive data, including notifications, messages, and other app data, to a Firebase Realtime Database endpoint.
  • FireScam monitors device activities such as screen state changes, e-commerce transactions, clipboard activity, and user engagement to gather valuable information covertly.
  • Captures notifications across various apps, including system apps, to potentially steal sensitive information and track user activities.
  • It employs obfuscation techniques to hide its intent and evade detection by security tools and researchers.
  • FireScam performs checks to identify if it is running in an analysis or virtualized environment.
  • The malware leverages Firebase for command-and-control communication, data storage, and to deliver additional malicious payloads.
  • Exfiltrated data is temporarily stored in the Firebase Realtime Database, filtered for valuable content, and later removed.
  • The Firebase database reveals potential Telegram IDs linked to the threat actors and contains URLs to other malware specimens hosted on the phishing site.
  • By exploiting the popularity of messaging apps and other widely used applications, FireScam poses a significant threat to individuals and organizations worldwide.
cyfirma EN 2025 FireScam Telegram Premium analysis fake apk android malware
Telegram hands over data on thousands of users to US law enforcement https://www.bleepingcomputer.com/news/legal/telegram-hands-over-data-on-thousands-of-users-to-us-law-enforcement/
12/01/2025 20:58:46
QRCode
archive.org
thumbnail

Telegram reveals that the communications platform has fulfilled 900 U.S. government requests, sharing the phone number or IP address information of 2,253 users with law enforcement.

bleepingcomputer EN 2025 Cybercrime Law-Enforcement Legal Privacy Telegram Transparency User-Data
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives? • KELA Cyber Threat Intelligence https://www.kelacyber.com/blog/three-months-after-the-storm-did-cybercriminals-move-to-telegram-alternatives/
20/12/2024 09:19:49
QRCode
archive.org
thumbnail

Introduction Telegram, as previously reported by KELA, is a popular and legitimate messaging platform that has evolved in the past few years into a major platform for cybercriminal activities. Its lack of strict content moderation has made the platform cybercriminals’ playground. They use the platform for distribution of stolen data and hacking tools, publicizing their […]

kelacyber EN 2024 Telegram analysis KELA platform cybercriminals
Plusieurs comptes Telegram de députés ont été piratés https://www.politico.eu/article/plusieurs-comptes-telegram-de-deputes-ont-ete-pirates/
22/11/2024 21:51:23
QRCode
archive.org
thumbnail

Les services de l’Assemblée nationale ont alerté l’ensemble des députés après le piratage.

politico FR 2024 Telegram France Assemblé piratés députés
Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials - SANS Internet Storm Center https://isc.sans.edu/diary/31388
28/10/2024 10:44:04
QRCode
archive.org
thumbnail

Self-contained HTML phishing attachment using Telegram to exfiltrate stolen credentials, Author: Jan Kopriva

isc.sans.edu EN 2024 phishing analysis telegram Self-contained SHTML HTML attachement Telegram
Neo-Nazis head to encrypted SimpleX Chat app, bail on Telegram https://arstechnica.com/tech-policy/2024/10/neo-nazis-head-to-encrypted-simplex-chat-app-bail-on-telegram/
14/10/2024 09:05:51
QRCode
archive.org
thumbnail

App swears there’s no way for law enforcement to track users’ identities.

arstechnica EN 2024 Neo-Nazis SimpleX telegram encrypted
Telegram Changes Policy, Says It Will Provide User Data to Authorities https://www.404media.co/telegram-changes-policy-says-it-will-provide-user-data-to-authorities/
23/09/2024 19:48:42
QRCode
archive.org
thumbnail

In an update to its privacy policy, Telegram says it will now share IP addresses and phone numbers to authorities in response to valid orders. The change is a dramatic switch for the social network app, which has become a hotbed for criminals.

404media EN 2024 Telegram privacy policy Authorities
Ukraine bans official use of Telegram app over fears of Russian spying https://www.reuters.com/technology/cybersecurity/ukraine-bans-official-use-telegram-app-over-fears-russian-spying-2024-09-20/?user_email=9e19aa6ed986d20195d4113ba5a6a3e709c18e0549688aa9b20d5f2e8d0dec05&lctg=6596a37f125992f7eb0b5ac9
21/09/2024 17:14:25
QRCode
archive.org
  • Restrictions apply only to official devices, not personal phones
  • Telegram heavily used in Ukraine and Russia since 2022 invasion
  • Budanov: Issue of Telegram is a matter of national security
reuters EN 2024 Telegram ban Ukraine Russia-Ukraine-war
In Wake of Durov Arrest, Some Cybercriminals Ditch Telegram https://www.404media.co/in-wake-of-durov-arrest-some-cybercriminals-ditch-telegram/
14/09/2024 12:33:22
QRCode
archive.org
thumbnail

Hackers, fraudsters, and drug dealers are all leaving the platform in one way or another. Some are worried that Telegram may start providing user data to the authorities.

404media EN 2024 Telegram Hackers fraudsters Durov leaving
Telegram: 'The dark web in your pocket' https://www.bbc.com/news/articles/cdey4prn3e1o
12/09/2024 15:16:59
QRCode
archive.org
thumbnail

The arrest of Telegram’s chief executive in France has ignited a debate about moderation on his app.
About nine months ago while researching a story, I found myself added to a large Telegram channel which was focused on selling drugs.
I was then added to one about hacking and then one about stolen credit cards.
I realised my Telegram settings had made it possible for people to add me to their channels without me doing anything. I kept the settings the same to see what would happen.

bbc EN 2024 Telegram the-dark-web-in-your-pocket
Behind the arrest of Telegram boss, a small Paris cybercrime unit with big ambitions https://www.reuters.com/world/europe/behind-arrest-telegram-boss-small-paris-cybercrime-unit-with-big-ambitions-2024-08-30/
02/09/2024 18:03:51
QRCode
archive.org
  • Durov's arrest marks a shift in dealing with tech chiefs
  • Brousse's unit goes after its biggest ever target
  • Legal experts question the prosecution's argument

The investigation into Telegram boss Pavel Durov that has fired a warning shot to global tech titans was started by a small cybercrime unit within the Paris prosecutor's office, led by 38-year-old Johanna Brousse.
The arrest of Durov, 39, last Saturday marks a significant shift in how some global authorities may seek to deal with tech chiefs reluctant to police illegal content on their platforms.
The arrest signalled the mettle of the J3 cybercrime unit, but the true test of its ambitions will be whether Brousse can secure a conviction based on a largely untested legal argument, lawyers said.

reuters EN 2024 Durov Telegram cybercrime J3
Hacktivist Response to Telegram CEO Arrest https://cyberknow.substack.com/p/hacktivist-response-to-telegram-ceo
29/08/2024 12:42:08
QRCode
archive.org

Telegram is vital to hacktivist groups and their operations. They would have limited platforms to operate on without Telegram, they try X but are often shut-down and they would likely get drowned out if they tried to operate on underground forums.

cyberknow EN 2024 #opdurov Telegram hacktivists
Telegram CEO’s brother also wanted by French authorities https://www.politico.eu/article/exclusive-telegram-ceo-brother-nikolai-durov-wanted-france-authorities-pavel-durov/
28/08/2024 14:12:38
QRCode
archive.org
thumbnail

Arrest warrants for Pavel and Nikolai Durov were issued months earlier than previously known.

politico EN 2024 France Telegram Durov arrest brother authorities
Threat Actors Retaliate After Durov’s Arrest https://dailydarkweb.net/threat-actors-retaliate-after-durovs-arrest/
27/08/2024 17:20:04
QRCode
archive.org
thumbnail

Threat Actors Retaliate After Durov’s Arrest Discover the latest security threats and database leaks, including unauthorized VPN access and email breaches, in the cyber underground world.Stay informed about emerging cyber threats, such as unauthorized access to databases and sensitive information leaks, affecting global companies and organizations.Learn about the latest cyber incidents, including DDoS attacks and malware threats targeting cryptocurrency wallets and financial institutions.

dailydarkweb EN 2024 Telegram France DDoS Durov
Après l’arrestation de Pavel Durov, une vague de cyberattaques cible la France https://www.liberation.fr/international/apres-larrestation-de-pavel-durov-une-vague-de-cyberattaques-cible-la-france-20240827_LA6BINIQPREQFCYLCRT3FDZEQM/
27/08/2024 17:17:22
QRCode
archive.org
thumbnail

Ces dernières heures, plusieurs sites français disent avoir été visés par des attaques informatiques. A l’origine de ces actions : des petits groupes de hackeurs qui réclament la libération du patron de Telegram.

liberation FR 2024 France telegram pavel-durov DDoS
page 1 / 3
4460 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio