• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Russia’s Rostec allegedly can de-anonymize Telegram users

Bill Toulas by Bill Toulas
March 25, 2023
Reading Time: 3 mins read
0
Russia’s Rostec allegedly can de-anonymize Telegram users

Rostec

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

Russia’s Rostec has reportedly bought a platform that allows it to uncover the identities of anonymous Telegram users, likely to be used to tamp down on unfavorable news out of the country.

Rostekh is a state-owned tech and defense systems corporation that comprises 800 enterprises and 15 companies,

The organization, which has an active role in monitoring the circulation of information within the country, is particularly interested in the identity of Telegram channel administrators who are critical of the Russian state.

This is reported by Russian media the Bell and Medusa, who investigated the matter after a series of arrests of anonymous Telegram channel owners and bloggers in 2022.

The Bell presents several cases that shook trust in Telegram’s security, including the arrests of commercial director Ksenia Sobchak Kirill Sukhanov, ex-editor-in-chief of Tatler magazine Arian Romanovsky, and journalist Tamerlan Bigaev, all users of the “Put out the light” Telegram channel.

According to the same reports, Rostec’s subsidiary “Avtomatika” (Автоматика) acquired a St. Petersburg IT company named T. Hunter in 2021, which has developed a product that can be used to identify anonymous users on Telegram.

Buy JNews
ADVERTISEMENT

The tool is allegedly called “Okhotnik” (Охотник), which translates to “hunter.” It is said to use over 700 data points to make associations and correlations that can lead to unmasking otherwise anonymous Telegram users.

The data points are drawn from social networks, blogs, forums, instant messengers, bulletin boards, cryptocurrency blockchains, darknet, and government services, and concern names, nicknames, email addresses, websites, domains, crypto wallets, encryption keys, phone numbers, geolocation info, IP addresses, and more.

“Hunter” can find any mistake made by the targeted users at any point in the past, so even the slightest and most distant exposure of their true identity can be used to create deanonymization paths.

“The interlocutors of the authors of the investigation on the “breakthrough” market compare “Hunter” with the well-known telegram bot Chimera,” reports the Bell.

“Similar programs are available on the Internet and the black market, but they, at best, contain merged databases, where most information is outdated, and its relevance must be checked.”

Moreover, unlike these programs, “Hunter” is entirely legal, with the Russian authorities comparing it to Palantir’s products or Paterva’s Maltego platform.

Nine of Russia's top 20 Telegram channels have unknown (неизвестный) admins
Nine of Russia’s top 20 Telegram channels have unknown (неизвестный) admins
(The Bell)

Rostec is reportedly planning to sell “Hunter” to all departments of the Russian Ministry of Internal Affairs and operational and technical units of the country’s federal security service (FSB) within 2023.

An IT expert of the Russian digital protection rights organization Roskomsvoboda, which has been classified as a foreign agent by the country’s Ministry of Justice since December 2022, commented that the “Hunter” cannot possibly identify Telegram channel owners by using only data points.

Instead, they believe they are using a zero-day vulnerability in the platform or working with an insider at Telegram to deanonymize users.

“In the case of determining channel owners, one cannot for sure assume real schemes without mixing up either some kind of 0day vulnerability in the Telegram API or cooperation with someone with administrative access to the messenger servers.” – Roskomsvoboda.

BleepingComputer has contacted Telegram for a comment on the above, but we have not received a response yet.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

The SEC has a new target in the crypto space and this is how its going so far

The SEC has a new target in the crypto space and this is how its going so far

April 17, 2023
Meta to fight €390 million fine for breaching EU data privacy laws

Meta to fight €390 million fine for breaching EU data privacy laws

January 4, 2023
Achieving true decentralization with Massa testnet

Achieving true decentralization with Massa testnet

May 12, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Litecoin’s upcoming halving and its effect on miners
  • Uniswap: What’s next as UNI’s plunge hits range low
  • Polygon zkEVM’s growth unhindered: What it means for MATIC

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?