Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Telegram security. Show all posts

Telegram's Security Under Scrutiny Over Alleged Ties to Russian Intelligence Infrastructure

 

Telegram, the widely used messaging platform known for its commitment to privacy and free speech, is facing renewed concerns over its security and potential exposure to Russian surveillance. A new investigation by the exiled investigative outlet IStories has revealed that the infrastructure supporting Telegram is managed by entities with direct and indirect links to Russian intelligence services.

The app’s founder, Russian-born Pavel Durov, has consistently portrayed Telegram as a stronghold for digital freedom, especially in regions ruled by authoritarian regimes. However, IStories reports that the app’s default communication settings may not be as secure as users assume.

Unlike rivals such as WhatsApp or Signal, Telegram does not enable end-to-end encryption by default. Only when users activate the “secret chat” feature are their messages fully protected. Otherwise, Telegram stores decrypted messages on its servers.

“This means that whoever controls the server can access the correspondence,” IStories stated.

According to the investigation, the company Global Network Management (GNM), based in Antigua and Barbuda, maintains the core infrastructure for Telegram and has supplied over 10,000 IP addresses to the platform. GNM is owned by Russian national Vladimir Vedeneev, who confirmed in a U.S. court that his company sets up and oversees Telegram’s infrastructure, with employees based in Russia. Court records also list Vedeneev as Telegram’s chief financial officer.

Further scrutiny revealed that many of GNM’s IP addresses were previously used by Globalnet, a telecommunications firm in St. Petersburg with documented ties to the Kremlin and Russia’s Federal Security Service (FSB). Telegram is also reported to have received 5,000 IP addresses from Electrontelecom, another St. Petersburg company identified as a contractor for the FSB. This firm has been involved in deploying secure communications for intelligence purposes.

In 2022, Globalnet reportedly installed user traffic monitoring tools at the behest of Roskomnadzor, Russia’s state communications regulator. At the time, Oleg Matveychev, deputy chair of the Russian Duma’s Information Policy Committee, stated that Telegram had agreed to a “compromise” with the FSB, implementing infrastructure that allows user monitoring in criminal investigations.

Beyond message decryption and storage, Telegram also assigns a unique device identifier—called “auth_key_id”—to each message, cybersecurity expert Michał Woźniak told IStories.

This mechanism, combined with metadata such as IP addresses and timestamps, “could be used to determine a user’s physical location and contacts,” Woźniak explained.
“If someone has access to Telegram traffic and cooperates with Russian intelligence services, this means that the device identifier becomes a really big problem — a tool for global surveillance of messenger users, regardless of where they are and what server they connect to,” he added.

In response to the investigation, Telegram issued a statement on Tuesday rejecting any allegations of unauthorized access.

“All Telegram servers belong to Telegram and are maintained by Telegram employees. Unauthorized access is impossible. Telegram has no employees or servers in Russia. Throughout its history, Telegram has never transmitted personal messages to third parties, and its encryption has never been hacked,” the company’s press service stated.

The findings, however, have raised important questions about how much control Telegram truly has over its infrastructure—and how secure its platform really is for millions of users worldwide.

Operation Zero Offers Up to $4M for Telegram Exploits

 

Operation Zero, a firm specializing in acquiring and selling zero-day vulnerabilities exclusively to Russian government entities and local companies, has announced a significant bounty for exploits targeting Telegram. The company is willing to pay up to $4 million for a full-chain exploit that could compromise the popular messaging app.

The exploit broker has set tiered rewards for different vulnerabilities:
  • Up to $500,000 for a one-click remote code execution (RCE) exploit.
  • Up to $1.5 million for a zero-click RCE exploit.
  • Up to $4 million for a full-chain exploit, potentially allowing hackers to gain full access to a target’s device.
Operation Zero’s focus on Telegram is strategic, given its widespread use in Russia and Ukraine. The company's offer provides insight into the Russian zero-day market, which remains largely secretive.

Exploit brokers often publicize bounties for vulnerabilities when they detect high demand. This suggests that the Russian government may have specifically requested Telegram exploits, prompting Operation Zero to advertise these high-value offers.

Zero-day vulnerabilities are particularly valuable because they remain unknown to software makers, making them highly effective for cyber operations. Among them, zero-click RCE exploits are the most sought after, as they require no user interaction—unlike phishing-based attacks—making them stealthier and more powerful.

A source familiar with the exploit market suggested that Operation Zero’s prices might be on the lower side, as the company could intend to resell these vulnerabilities multiple times at a higher margin.

“I don’t think they’ll actually pay full [price]. There will be some bar the exploit doesn’t clear, and they’ll only do a partial payment,” said the source.

Another industry expert noted that pricing depends on factors like exclusivity and whether Operation Zero intends to redevelop the exploits internally or act solely as a broker.

The Ukrainian government recently banned the use of Telegram for government and military personnel due to concerns over potential exploitation by Russian state-backed hackers. Security researchers have long warned that Telegram is less secure than alternatives like Signal and WhatsApp, primarily because it does not use end-to-end encryption by default.

“The vast majority of one-on-one Telegram conversations — and literally every single group chat — are probably visible on Telegram’s servers,” said cryptography expert Matthew Green.

Despite this, Telegram spokesperson Remi Vaughn stated: “Telegram has never been vulnerable to a zero-click exploit,” while also emphasizing the company’s bug bounty program.

The zero-day market has become increasingly competitive, driving up prices. In 2023, a WhatsApp zero-day was reportedly valued at $8 million. Operation Zero has previously offered $20 million for exploits capable of fully compromising iOS and Android devices but currently caps those payouts at $2.5 million.

With cyber threats escalating, the demand for zero-days—especially for widely used platforms like Telegram—remains at an all-time high.