Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Posted on January 12, 2026January 12, 2026 By CWS

A stealthy flaw in Telegram’s cell purchasers that lets attackers unmask customers’ actual IP addresses with a single click on, even these hiding behind proxies. Dubbed a “one-click IP leak,” the vulnerability turns seemingly innocuous username hyperlinks into potent monitoring weapons.

The problem hinges on Telegram’s computerized proxy validation mechanism. When customers encounter a disguised proxy hyperlink, typically embedded behind a username (e.g., t.me/proxy?server=attacker-controlled), the app pings the proxy server earlier than including it.

Crucially, this ping bypasses all user-configured proxies, routing instantly from the sufferer’s gadget and exposing their true IP. No secret secret is required, mirroring NTLM hash leaks on Home windows, the place authentication makes an attempt betray the consumer.

Cybersecurity skilled @0x6rss demonstrated an assault vector on X (previously Twitter) and shared a proof-of-concept: a 1-click Telegram IP Leak. “Telegram auto-pings the proxy earlier than including it,” they famous. “Request bypasses all configured proxies. Your actual IP is logged immediately.”

ONE-CLICK TELEGRAM IP ADDRESS LEAK!On this problem, the key secret is irrelevant. Similar to NTLM hash leaks on Home windows, Telegram mechanically makes an attempt to check the proxy. Right here, the key key doesn’t matter and the IP handle is uncovered.Instance of a hyperlink hidden behind a… pic.twitter.com/NJLOD6aQiJ— 0x6rss (@0x6rss) January 10, 2026

How the Assault Unfolds

Attackers craft malicious proxy URLs and masks them as clickable usernames in chats or channels. A focused person clicks as soon as, triggering:

Automated proxy take a look at: Telegram sends a connectivity probe to the attacker’s server.

Proxy bypass: The request ignores SOCKS5, MTProto, or VPN setups, utilizing the gadget’s native community stack.

IP logging: Attacker’s server captures the supply IP, geolocation, and metadata.

Each Android and iOS purchasers are susceptible, affecting hundreds of thousands who depend on Telegram for privacy-sensitive communications. No person interplay past the press is required; it’s silent and efficient for doxxing, surveillance, or deanonymizing activists.

This flaw underscores dangers in proxy-heavy apps amid rising state-sponsored monitoring. Telegram, with over 950 million customers, has but to publicly patch it. Related bypasses have plagued apps like Sign prior to now.

Mitigations:

Disable auto-proxy detection in settings (if accessible).

Keep away from clicking on unknown usernames/hyperlinks.

Use firewall guidelines to dam outbound proxy pings (e.g., through Little Snitch on iOS or AFWall+ on Android).

Monitor for patches through Telegram’s changelog.

Researchers urge rapid fixes. Telegram didn’t reply to requests for remark by press time.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:1Click, Addresses, Android, Bypassing, Exposes, IOS, Proxies, Real, Telegram, Users

Post navigation

Previous Post: n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Next Post: Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package

Related Posts

Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Cyber Security News
Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News
Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges Cyber Security News
CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks Cyber Security News
Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News