Sunday, May 18, 2025
HomeSecurity NewsRussia Ordered Telegram to Handover the Encryption keys

Russia Ordered Telegram to Handover the Encryption keys

Published on

SIEM as a Service

Follow Us on Google News

Russian Court ordered to Telegram Messenger to hand over the encryption keys to the concern authorities ( Country’s Federal Security Service (FSB)) to views the user’s data.

Telegram is a non-profit cloud-based instant messaging service with 100 million global users and its listed under the highly secured messenger App among another messenger such as Whatsup and Wechat.

FSB appealed against Telegram in 2017 to get the encryption keys and an anti-terrorism rule signed into 2018 intimated that messaging services should provide the Encryption keys to access the user’s information.

- Advertisement - Google News

Russia’s communications regulator, Roskomnadzor, has given Telegram 15 days to hand over the encryption keys.

Court Order says, “Federal Security Service of the Russian Federation necessary for decoding received, transmitted, delivered and (or) processed electronic messages of users”.

In this case, Russia’s Federal Security Service (FSB) argues that possessing the encryption keys is not a violation of a user’s privacy. It’s only under a court order that those keys can be used to access encrypted content.

Also Read: Cybercrime-as-a-Service – DDoS Attack Services Available in Dark Web Markets for $10 per Hour

Telegram’s founder Pavel Durov said to Bloomberg, Company appeal again in this case and he Twitted as “Threats to block Telegram unless it gives up private data of its users won’t bear fruit. Telegram will stand for freedom and privacy.”

Ramil Akhmetgaliev, a lawyer of Telegram, told reporters after Russia’s Supreme Court hearing forcing the company to hand over keys: “The FSB’s argument that encryption keys can’t be considered private information defended by the Constitution is cunning. It’s like saying, ‘I’ve got a password from your email, but I don’t control your email, I just have the possibility to control.’”

Federal Security Service, the successor to the KGB spy agency which last year asked the company to share its encryption keys. The company declined to comply and was paid with a fine of $14,000.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...