Wednesday, January 29, 2025
HomeSecurity NewsRussian Telecom Blocks 50 VPNs & Proxy Services that used to Access...

Russian Telecom Blocks 50 VPNs & Proxy Services that used to Access Telegram

Published on

SIEM as a Service

Follow Us on Google News

Around 50 VPN & Proxy Services have been blocked by Russian telecom regulator that provides access to Telegram Messenger.

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Later Russia banned Telegram Messenger a few months back after Telegram refuses to hand over the encryption keys.

Also, Telegram said those demands would be impossible to implement since the keys were stored on users’ devices

In this attempt of blocking VPN and proxy servers will be very limited and they can able to block the specific number of IP address.

Last month 3 subnets were removed by Roskomnadzor As part of a package of measures to enforce a court decision against Telegram 52.192.0.0/11 (Amazon), 54.160.0.0/12 (Amazon), 91.121.0.0/16 (OVH) – it’s just over 3 million addresses as a part of an action to prevent Telegram from switching IPs.

According to Russian News Agency, Telegram’s top officials said that this requirement was impossible to meet technically and tried to challenge it in several court battles, but to no avail. On March 20, 2018, Russia’s Supreme Court rejected the company’s lawsuit.

Similarly, Another Messenger App Viber being block in Russia and regulator sees no preconditions to block Viber, deputy head of the regulator Vadim Subbotin told reporters on Thursday.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

LegionLoader Abusing Chrome Extensions To Deliver Infostealer Malware

LegionLoader, a C/C++ downloader malware, first seen in 2019, delivers payloads like malicious Chrome...

North Korean Hackers Stolen $2.2 Billion From Crypto Platforms In 2024

Cryptocurrency hacking incidents in 2024 surged 21.07% YoY to $2.2 billion, with 303 breaches...