Saturday, December 28, 2024
HomeSecurity NewsRussian Telecom Blocks 50 VPNs & Proxy Services that used to Access...

Russian Telecom Blocks 50 VPNs & Proxy Services that used to Access Telegram

Published on

SIEM as a Service

Around 50 VPN & Proxy Services have been blocked by Russian telecom regulator that provides access to Telegram Messenger.

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Later Russia banned Telegram Messenger a few months back after Telegram refuses to hand over the encryption keys.

- Advertisement - SIEM as a Service

Also, Telegram said those demands would be impossible to implement since the keys were stored on users’ devices

In this attempt of blocking VPN and proxy servers will be very limited and they can able to block the specific number of IP address.

Last month 3 subnets were removed by Roskomnadzor As part of a package of measures to enforce a court decision against Telegram 52.192.0.0/11 (Amazon), 54.160.0.0/12 (Amazon), 91.121.0.0/16 (OVH) – it’s just over 3 million addresses as a part of an action to prevent Telegram from switching IPs.

According to Russian News Agency, Telegram’s top officials said that this requirement was impossible to meet technically and tried to challenge it in several court battles, but to no avail. On March 20, 2018, Russia’s Supreme Court rejected the company’s lawsuit.

Similarly, Another Messenger App Viber being block in Russia and regulator sees no preconditions to block Viber, deputy head of the regulator Vadim Subbotin told reporters on Thursday.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a...

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated...

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms...

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an...