Hindustan Times (East UP)

Researcher­s find four problems in Telegram’s cloud

- Prasid Banerjee prasid.b@livemint.com MINT

NEW DELHI: A group of researcher­s at the Royal Holloway, University of London, have found four critical flaws in popular messaging app Telegram.

The platform has often touted security as a key reason for users coming to it. However, while Telegram offers one of the most preferred end-to-end encrypted (E2EE) apps through a feature called secret chats, it also offers regular cloud chats that are not encrypted.

E2EE offers users protection from man-in-the-middle (MITM) attacks, where an attacker places themselves between the sender or receiver of a message and the cloud server that routes that message. E2EE ensures that even a service provider such as WhatsApp or Telegram won’t be able to read messages that users send, which also means that they cannot provide the content of those messages to government­s, law enforcemen­t agencies, or others.

Telegram uses a protocol called MTProto to secure its cloud chats, which is the company’s own version of transport layer security (TLS), a popular cryptograp­hic standard meant to ensure security of data in transit. TLS also protects against MITM attacks to an extent, but does not stop servers held by companies such as Telegram from reading these texts when needed.

According to the researcher­s, Telegram’s cloud chats have a flaw where an adversary on the network can reorder messages. The researcher­s said they did not know of examples where this vulnerabil­ity was exploited, but noted that it can be used by an attacker to manipulate Telegram bots.

The researcher­s found code in the Android, iOS, and desktop versions of Telegram that could allow attackers to extract plaintext from encrypted messages. Such an attack can be devastatin­g for the platform and its users, but would require a significan­t amount of work by the attacker. That means that such an attack will be carried out by a significan­tly motivated attacker such as nation-state backed hacker groups.

This, along with two other flaws, have all been fixed by Telegram, the platform said in a blog post on July 16. “The latest versions of official Telegram apps already contain the changes that make the four observatio­ns made by the researcher­s no longer relevant,” the platform wrote.

Interestin­gly, while Telegram claimed that the vulnerabil­ities didn’t allow attackers to decipher text messages, that may not be completely true. The researcher­s noted that one of the flaws allowed an MITM attack which would allow an attacker to “impersonat­e” Telegram’s servers and hence “break both the confidenti­ality and integrity of communicat­ion.

On Friday, an internatio­nal team of computer scientists reported on Friday that they found four cryptograp­hic vulnerabil­ities in the popular encrypted message app Telegram.

The weaknesses range “from technicall­y trivial and easy to exploit to more advanced and of theoretica­l interest,” according to the security analysis.

 ??  ?? Researcher­s found code that could allow attackers to extract plain text from encrypted messages.
Researcher­s found code that could allow attackers to extract plain text from encrypted messages.

Newspapers in English

Newspapers from India