Critical Telegram Vulnerability Exposes User IP Addresses Through Proxy Links
Security researchers have identified a significant vulnerability in Telegram's Android and iOS applications that allows malicious actors to obtain users' real IP addresses through specially crafted proxy links. The exploit requires no additional user confirmation beyond clicking the link, making it particularly dangerous.
The vulnerability stems from Telegram's handling of MTProto proxy links (formatted as t.me/proxy?...). These links are designed to enable quick proxy configuration within the Telegram client by simply clicking, eliminating the need for manual data entry. When opened in Telegram, the application automatically parses proxy parameters including server address, port, and secret key, then prompts users to add the proxy to their settings.
The critical security flaw allows attackers to disguise malicious proxy links as legitimate usernames. For instance, a message may display what appears to be a link to @durov, while the actual URL redirects to an attacker-controlled proxy server. Upon interaction, the application establishes an automatic connection to the malicious server, inadvertently transmitting the user's real IP address without any warning or additional consent.
This vulnerability poses significant privacy risks, particularly for users who rely on Telegram's anonymity features or operate in regions where such exposure could have serious consequences.
Related news
Try these AI tools
Boost productivity and simplify tasks on your Mac with Impel's advanced automation and privacy featu...
Online AI clothes remover/changer with HD results in ~30s, privacy safeguards, virtual try-on, and a...