Thursday, May 1, 2025
HomeSecurity NewsRussia Ordered Telegram to Handover the Encryption keys

Russia Ordered Telegram to Handover the Encryption keys

Published on

SIEM as a Service

Follow Us on Google News

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Telegram is a non-profit cloud-based instant messaging service with 100 million global users and its listed under the highly secured messenger App among another messenger such as Whatsup and Wechat.

FSB appealed against Telegram in 2017 to get the encryption keys and an anti-terrorism rule signed into 2018 intimated that messaging services should provide the Encryption keys to access the user’s information.

- Advertisement - Google News

Russia’s communications regulator, Roskomnadzor, has given Telegram 15 days to hand over the encryption keys.

Court Order says, “Federal Security Service of the Russian Federation necessary for decoding received, transmitted, delivered and (or) processed electronic messages of users”.

In this case, Russia’s Federal Security Service (FSB) argues that possessing the encryption keys is not a violation of a user’s privacy. It’s only under a court order that those keys can be used to access encrypted content.

Also Read: Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour

Telegram’s founder Pavel Durov said to Bloomberg, Company appeal again in this case and he Twitted as “Threats to block Telegram unless it gives up private data of its users won’t bear fruit. Telegram will stand for freedom and privacy.”

Ramil Akhmetgaliev, a lawyer of Telegram, told reporters after Russia’s Supreme Court hearing forcing the company to hand over keys: “The FSB’s argument that encryption keys can’t be considered private information defended by the Constitution is cunning. It’s like saying, ‘I’ve got a password from your email, but I don’t control your email, I just have the possibility to control.’”

Federal Security Service, the successor to the KGB spy agency which last year asked the company to share its encryption keys. The company declined to comply and was paid with a fine of $14,000.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Trellix Launches Phishing Simulator to Help Organizations Detect and Prevent Attacks

Trellix, a leader in cybersecurity solutions, has unveiled its latest innovation, the Trellix Phishing...

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...

Researchers Reveal Threat Actor TTP Patterns and DNS Abuse in Investment Scams

Cybersecurity researchers have uncovered the intricate tactics, techniques, and procedures (TTPs) employed by threat...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...