
Not so long ago, we
wrote about a successful series of attacks on Telegram users in Iran. Using the technique of intercepting SMS messages with the activation code of a new device, the attackers were able not only to de-anonymize users of the service, but also, in some cases, to access their correspondence.
This time the same situation
repeated , but with Telegram users in Germany. We are talking about the investigation by law enforcement agencies of the activities of the criminal gang, which they were able to track down thanks to the aforementioned method of deanonymization of Telegram.
In the case of a person, he received a message. The BKA can intercept this information. Thus, the BKA is the account of the suspect.
If you’re talking on the phone, you’ll be able to get the message. -terminal ", puts it in a note of the BKA. But not only that, it will be displayed for the investigators. If you’re talking on a phone, it’s not a problem. your phone, but also on your computer.
BKA - Federal Criminal Police Office of Germany.
')
As can be seen from the described technology, law enforcement officers managed to register a new device for an existing Telegram account by intercepting an SMS message with an activation code. After that, they were able to access all the data content of the specified account, including correspondence. Since Telegram does not use E2E encryption by default, these users did not use this optional mode, which served as a disclosure factor for the correspondence.
