A group of researchers at the Royal Holloway, University of London found that Telegram’s cloud chats have a flaw where an adversary on the network can reorder messages, allowing an attacker to manipulate Telegram bots
They also found code in the Android, iOS and desktop versions of Telegram, which could allow attackers to extract plaintext from encrypted messages
A group of researchers at the Royal Holloway, University of London, have found four critical flaws in popular messaging app Telegram.
The platform has often touted security as a key reason for users coming to it. However, while Telegram offers one of the most preferred end-to-end encrypted (E2EE) apps through a feature called secret chats, it also offers regular cloud chats that are not encrypted. E2EE offers users protection from man-in-the-middle (MITM) attacks, where an attacker places themselves between the sender or receiver of a message and the cloud server that routes that message. E2EE ensures that even a service provider such as WhatsApp or Telegram won’t be able to read messages that users send, which also means that they cannot provide the content of those messages to governments, law enforcement agencies, or others.
Telegram uses a protocol called MTProto to secure its cloud chats, which is the company’s own version of transport layer security (TLS), a popular cryptographic standard meant to ensure security of data in transit. TLS also protects against MITM attacks to an extent, but does not stop servers held by companies such as Telegram from reading these texts when needed.
According to the researchers, Telegram’s cloud chats have a flaw where an adversary on the network can reorder messages. The researchers said they did not know of examples where this vulnerability was exploited, but noted that it can be used by an attacker to manipulate Telegram bots.
The researchers found code in the Android, iOS, and desktop versions of Telegram that could allow attackers to extract plaintext from encrypted messages. Such an attack can be devastating for the platform and its users, but would require a significant amount of work by the attacker. That means that such an attack will be carried out by a significantly motivated attacker such as nation-state backed hacker groups.
This, along with two other flaws, have all been fixed by Telegram, the platform said in a blog post on 16 July. “The latest versions of official Telegram apps already contain the changes that make the four observations made by the researchers no longer relevant," the platform wrote.
“The traits of MTProto pointed out by the group of researchers from the University of London and ETH Zurich were not critical, as they didn't allow anyone to decipher Telegram messages. Reading, or extracting the messages in a plain text format was practically impossible even before the updates were released by Telegram. The latest versions of official Telegram apps already contain the changes that make the four observations made by the researchers no longer relevant.
All the chats on Telegram are encrypted by default – the cloud chats on Telegram’s own servers are encrypted by MTProto protocol, and the Secret Chats are encrypted under end-to-end encryption protocol."