Tuesday, April 1, 2025
HomeSecurity NewsRussia Ordered Telegram to Handover the Encryption keys

Russia Ordered Telegram to Handover the Encryption keys

Published on

SIEM as a Service

Follow Us on Google News

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Telegram is a non-profit cloud-based instant messaging service with 100 million global users and its listed under the highly secured messenger App among another messenger such as Whatsup and Wechat.

FSB appealed against Telegram in 2017 to get the encryption keys and an anti-terrorism rule signed into 2018 intimated that messaging services should provide the Encryption keys to access the user’s information.

Russia’s communications regulator, Roskomnadzor, has given Telegram 15 days to hand over the encryption keys.

Court Order says, “Federal Security Service of the Russian Federation necessary for decoding received, transmitted, delivered and (or) processed electronic messages of users”.

In this case, Russia’s Federal Security Service (FSB) argues that possessing the encryption keys is not a violation of a user’s privacy. It’s only under a court order that those keys can be used to access encrypted content.

Also Read: Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour

Telegram’s founder Pavel Durov said to Bloomberg, Company appeal again in this case and he Twitted as “Threats to block Telegram unless it gives up private data of its users won’t bear fruit. Telegram will stand for freedom and privacy.”

Ramil Akhmetgaliev, a lawyer of Telegram, told reporters after Russia’s Supreme Court hearing forcing the company to hand over keys: “The FSB’s argument that encryption keys can’t be considered private information defended by the Constitution is cunning. It’s like saying, ‘I’ve got a password from your email, but I don’t control your email, I just have the possibility to control.’”

Federal Security Service, the successor to the KGB spy agency which last year asked the company to share its encryption keys. The company declined to comply and was paid with a fine of $14,000.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Massive 400GB X (Twitter) Data Leak Surfaces on Hacker Forums

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has...

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the...

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised...

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...