Tuesday, December 5, 2023

Russian Telecom Blocks 50 VPNs & Proxy Services that used to Access Telegram

Around 50 VPN & Proxy Services have been blocked by Russian telecom regulator that provides access to Telegram Messenger.

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Later Russia banned Telegram Messenger a few months back after Telegram refuses to hand over the encryption keys.

Also, Telegram said those demands would be impossible to implement since the keys were stored on users’ devices

In this attempt of blocking VPN and proxy servers will be very limited and they can able to block the specific number of IP address.

Last month 3 subnets were removed by Roskomnadzor As part of a package of measures to enforce a court decision against Telegram (Amazon), (Amazon), (OVH) – it’s just over 3 million addresses as a part of an action to prevent Telegram from switching IPs.

According to Russian News Agency, Telegram’s top officials said that this requirement was impossible to meet technically and tried to challenge it in several court battles, but to no avail. On March 20, 2018, Russia’s Supreme Court rejected the company’s lawsuit.

Similarly, Another Messenger App Viber being block in Russia and regulator sees no preconditions to block Viber, deputy head of the regulator Vadim Subbotin told reporters on Thursday.


Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles