Friday, January 17, 2025
HomeCyber Security NewsNew Tool Unveiled to Scan Hacking Content on Telegram

New Tool Unveiled to Scan Hacking Content on Telegram

Published on

SIEM as a Service

Follow Us on Google News

A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI module designed to monitor and analyze content on Telegram.

Known as the Apparatus Sapiens AI module, this innovative tool can search through both open and closed chats, communities, and groups on the messaging platform, identifying potentially malicious content at an unprecedented speed.

This development aims to enhance security measures across RuNet, particularly in light of recent reports of cybercrime and violent incidents.

Accelerating Cybersecurity Efforts

The Apparatus Sapiens module utilizes a sophisticated search neural network to process vast amounts of data, enabling it to detect signs of criminal activity far more quickly than human analysts.

Igor Beder, director at T.Hunter, emphasized the tool’s capability: “It allows you to analyze the content published on the social network and find signs of a crime. The program operates thousands of times faster than Telegram analysts, making it a critical asset for law enforcement.”

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

A key feature of the module is its de-anonymization capability, which links discovered content to its authors and exposes their identities. This function has become increasingly important amid reports of arson attacks and other violent crimes in Russia.

The AI can analyze the tone of messages—identifying dangerous keywords like “explosion” or “arson”—and subsequently gather additional data about the message’s author, including demographic information and network connections.“

The system monitors 22 million chats, both public and private, where the most pertinent threats are often found,” Beder explained.

Once suspicious content is flagged, the tool can retrieve detailed user information, including mobile numbers and geolocation, which is then shared with law enforcement under existing cooperation agreements.

While the tool’s potential for fighting cybercrime is commendable, experts urge caution regarding its ethical implications. Zhanna Meksheneva, Head of Applied Mathematics at Synergy University, stressed the importance of implementing regulations to prevent misuse.

 “There’s a risk that such services could be exploited for stalking or blackmail,” she cautioned, advocating for restricted access to ensure that only trustworthy organizations can utilize this technology.

The introduction of this AI-driven tool is part of a broader trend in social media monitoring aimed at identifying extremist or criminal content. Similar initiatives exist worldwide, such as the US government’s PRISM program, which gathers data from public sources legally.

As the digital landscape evolves, the need for advanced monitoring technologies continues to grow, highlighting the delicate balance between safety and privacy in the fight against cybercrime.

As the capabilities of tools like Apparatus Sapiens develop, they promise to play a crucial role in enhancing cybersecurity while raising essential questions about data ethics and user privacy.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which...

Let’s Encrypt Unveils Six-Day Certificate and IP Address Options for 2025

Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

AWS Warns of Multiple Vulnerabilities in Amazon WorkSpaces, Amazon AppStream 2.0, & Amazon DCV

Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific...

FlowerStorm PaaS Platform Attacking Microsoft Users With Fake Login Pages

Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms....

PoC Exploit Released for Ivanti Connect Secure RCE Vulnerability

A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which...