Connect with us

Expert Speak

Telegram’s Privacy Paradox: The Challenges of Balancing Security and Responsibility

Published

on

Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East

In the complex and ever-evolving world of digital communication, Telegram has emerged as a platform that uniquely exemplifies the tension between privacy, security, and the responsibilities of tech companies in the 21st century. From its inception, Telegram has distinguished itself from other social networks and messaging apps by offering features designed to enhance user privacy and facilitate large-scale communication. These include end-to-end encryption (in secret chats), anonymous accounts, and the ability to create groups with up to 200,000 members, making it a popular choice for users worldwide. However, this popularity brings significant challenges, particularly in the realm of cyber security.

One of Telegram’s most distinctive aspects is its strong emphasis on privacy. Unlike many other platforms, Telegram allows users to join groups and communicate without revealing their phone numbers, offering a level of anonymity highly valued in an age where digital footprints are increasingly scrutinized. This focus on privacy extends to its encryption practices, with end-to-end encryption available in secret chats, ensuring that messages are accessible only to intended recipients. Additionally, Telegram’s use of its MTProto protocol for standard chats balances speed and security, making it a preferred choice for users prioritizing both performance and privacy.

However, the same features that make Telegram attractive to privacy-conscious users also create vulnerabilities that can be exploited by malicious actors. The platform’s capacity for anonymous communication and its less aggressive approach to content moderation have made it a haven for those engaging in illegal activities. From the sale of illegal goods to the coordination of cyberattacks, Telegram’s infrastructure has, at times, facilitated activities outside the bounds of the law. This has led to growing concerns among governments and cybersecurity experts about the potential for misuse.

The recent arrest of Telegram’s CEO under allegations related to the platform’s use by illegal groups has brought these issues to the forefront. This event highlights the ongoing struggle to balance the protection of user privacy with the need to prevent and mitigate illegal activities online. It also raises important questions about the responsibilities of platform providers in policing content and communications on their networks. In a world where digital privacy is increasingly valued, how can platforms like Telegram ensure they are not inadvertently enabling criminal behaviour? What role should governments and cyber security firms play in monitoring and regulating these platforms?

From a cyber security perspective, Telegram’s challenges are significant. The platform’s distributed infrastructure, spread across multiple jurisdictions, makes it difficult to block or take down, even in countries where it is officially banned. This resilience against censorship is one of Telegram’s key strengths, allowing it to remain operational in regions with restrictive governments. However, it also means that law enforcement agencies face significant hurdles in monitoring and shutting down illegal activities on the platform. The built-in proxy support that allows users to bypass government restrictions further complicates efforts to control the flow of information and activity on Telegram.

Another key issue is the scale at which Telegram operates. With the ability to create groups of up to 200,000 members, Telegram facilitates the rapid dissemination of information, which can be both a blessing and a curse. While this capability allows for the formation of large, engaged communities, it also makes it easier for bad actors to spread harmful content or coordinate large-scale illegal activities. The sheer size of these groups makes moderation a daunting task, and Telegram’s relatively lenient approach to content takedowns has been a point of contention for critics who argue that the platform does not do enough to curb illegal behaviour.

Despite these challenges, Telegram’s rise to popularity is understandable. The platform offers a level of privacy and functionality that is unmatched by many of its competitors. For users who value their anonymity and want to engage in large-scale communication without the fear of being tracked or monitored, Telegram is an ideal choice. The platform’s features are particularly appealing in regions where government surveillance is prevalent, providing users with a means of communication that is resistant to censorship and government interference.

However, as the arrest of Telegram’s CEO demonstrates, the platform’s success comes with significant risks. The fine line between protecting user privacy and enabling illegal activities is one that Telegram, like many other tech companies, must navigate carefully. The challenge lies in finding a way to uphold the principles of privacy and freedom of speech while also taking proactive measures to prevent the platform from being used for nefarious purposes.

For cyber security firms, the situation with Telegram underscores the importance of developing advanced solutions that can address these complex issues. As the digital landscape continues to evolve, tech companies, governments, and cyber security experts need to work together to create an environment where users can communicate freely without fear of their privacy being compromised, while also ensuring that these platforms are not used to facilitate illegal activities. The arrest of Telegram’s CEO is a reminder of the ongoing challenges in this space and the need for continued innovation and collaboration to protect both individual freedoms and global security.

In conclusion, while Telegram offers unique advantages in terms of privacy and scalability, these same features also pose significant challenges from a cybersecurity standpoint. The platform’s resilience, anonymity, and large group capabilities make it both a powerful tool for legitimate communication and a potential hotspot for illegal activities. As we move forward, it will be crucial to find a balance that allows for the protection of user privacy while also addressing the security concerns that come with such a powerful platform.

Cyber security Tips for Telegram Users:

  1. Enable Two-Factor Authentication (2FA): Adding an extra layer of security to your Telegram account helps protect against unauthorized access.
  2. Be Cautious with Public Groups and Channels: Always verify the authenticity and purpose of public groups or channels before engaging to avoid potential scams or malicious content.
  3. Regularly Update Your Telegram App: Ensure you have the latest security patches and features by keeping your Telegram app updated.
  4. Use Secret Chats for Sensitive Conversations: Secret Chats offer end-to-end encryption, providing an additional layer of privacy for sensitive communications.
  5. Monitor App Permissions: Regularly check and manage the permissions Telegram has on your device to prevent unnecessary access to your data.

Artificial Intelligence

How AI is Reinventing Cybersecurity for the Automotive Industry

Published

on

Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)

Continue Reading

Cyber Security

Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits

Published

on

Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.

Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.

Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.

Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.

Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”

Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.

Continue Reading

Expert Speak

What the Bybit Hack Reveals About the Future of Crypto Security

Published

on

Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.