Advertisement
Subscribe to our daily newsletter.
Subscribe

Cryptographers unearth vulnerabilities in Telegram’s encryption protocol

The weaknesses range "from technically trivial and easy to exploit to more advanced and of theoretical interest."

By

This picture taken on October 5, 2020 shows the logo of mobile messaging and call service telegram on a tablet screen in Toulouse, southwestern France. (Photo by LIONEL BONAVENTURE/AFP via Getty Images)

An international team of computer scientists reported on Friday that they found four cryptographic vulnerabilities in the popular encrypted message app Telegram.

The weaknesses range “from technically trivial and easy to exploit to more advanced and of theoretical interest,” according to the security analysis. But ultimately they prove that the four key issues “could be done better, more securely and in a more trustworthy manner with a standard approach to cryptography,” said ETH Zurich Professor Kenny Paterson, who was part of the team that uncovered the flaw.

The most significant of the vulnerabilities the researchers uncovered is what they called the “crime-pizza” vulnerability. In it, an attacker could alter the order of messages coming from a client to a cloud server that Telegram operates.

“For example, if the order of the messages in the sequence ‘I say “yes” to’, ‘pizza’, ‘I say “no” to’, “crime” was altered then it would appear that the client is declaring their willingness to commit a crime,” according to the universities.

Advertisement

In one of the more theoretical vulnerabilities, an attacker could discern which of two messages were encrypted by a client or a server, although it would require special circumstances to be able to do so.

Telegram relies on its own MTProto encryption protocol, rather than a more widely used protocol like Transport Layer Security.Cryptographers have eyed MTProto skeptically in the past, too.The latest research serves as a reminder that while encrypted apps offer a significant degree of security,they aren’t 100% impervious to exploitation.

Cryptographers from ETH Zurich, a public research university in Switzerland, and the Royal Holloway constituent college of the University of London disclosed the vulnerabilities to Telegram in April. The encrypted app counts more than 500 million monthly users.

“For most users, the immediate risk is low, but these vulnerabilities highlight that Telegram fell short of the cryptographic guarantees enjoyed by other widely deployed cryptographic protocols,”a university summary states.

Telegram wrote that it made changes in response to the disclosure “that make the four observations made by the researchers no longer relevant.”

Advertisement

It also highlighted that the vulnerabilities weren’t critical. “We welcome any research that helps make our protocol even more secure,” Telegram said. “These particular findings helped further improve the theoretical security of the protocol.”

Tim Starks

Written by Tim Starks

Tim Starks is senior reporter at CyberScoop. His previous stops include working at The Washington Post, POLITICO and Congressional Quarterly. An Evansville, Ind. native, he's covered cybersecurity since 2003. Email Tim here:tim.starks@cyberscoop.com.
Advertisement
Advertisement

More Like This

  1. ‘Stranger Things’ emerge when OT security is stuck in the past

  2. Underground AI models promise to be hackers ‘cyber pentesting waifu’ 

  3. Dozens of groups call for governments to protect encryption 

Advertisement

Top Stories

  1. New legislation targets scammers that use AI to deceive

  2. Crisis24 shuts down emergency notification system in wake of ransomware attack

  3. Congress calls on Anthropic CEO to testify on Chinese Claude espionage campaign

Advertisement

More Scoops

A satellite over the U.S. East Coast. (Pixabay)

Researchers find a startlingly cheap way to steal your secrets from space 

Using commercially available equipment, researchers scanned 39 satellites and observed sensitive, encrypted communications from telecoms, businesses and the U.S. military. 
ntern Marc Sibaja looks at the IBM Quantum System Two at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. Technology veteran IBM on June 10 laid out a plan to have a “practical” quantum computer tackling big problems before the end of this decade. Current quantum computers are still experimental and face significant challenges, including high error rates. Companies like IBM, Google, and others are working to build more stable and scalable quantum systems. (Photo by ANGELA WEISS / AFP)

Why federal IT leaders must act now to deliver NIST’s post-quantum cryptography transition

Parts of the IBM Quantum System Two are displayed at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. (Photo by ANGELA WEISS / AFP)

Trump administration planning expansion of U.S. quantum strategy

Latest Podcasts

What happens if CISA 2015 lapses?

How Visa’s CISO turns a ‘paranoid and pessimisitic mindset’ into positive security outcomes

What security teams should do to prepare for the quantum computing future

CMMC compliance made practical: A data-first path forward

Government

Technology

Threats

Policy