Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Posted on January 12, 2026January 12, 2026 By CWS

A stealthy flaw in Telegram’s cell purchasers that lets attackers unmask customers’ actual IP addresses with a single click on, even these hiding behind proxies. Dubbed a “one-click IP leak,” the vulnerability turns seemingly innocuous username hyperlinks into potent monitoring weapons.

The problem hinges on Telegram’s computerized proxy validation mechanism. When customers encounter a disguised proxy hyperlink, typically embedded behind a username (e.g., t.me/proxy?server=attacker-controlled), the app pings the proxy server earlier than including it.

Crucially, this ping bypasses all user-configured proxies, routing instantly from the sufferer’s gadget and exposing their true IP. No secret secret is required, mirroring NTLM hash leaks on Home windows, the place authentication makes an attempt betray the consumer.

Cybersecurity skilled @0x6rss demonstrated an assault vector on X (previously Twitter) and shared a proof-of-concept: a 1-click Telegram IP Leak. “Telegram auto-pings the proxy earlier than including it,” they famous. “Request bypasses all configured proxies. Your actual IP is logged immediately.”

ONE-CLICK TELEGRAM IP ADDRESS LEAK!On this problem, the key secret is irrelevant. Similar to NTLM hash leaks on Home windows, Telegram mechanically makes an attempt to check the proxy. Right here, the key key doesn’t matter and the IP handle is uncovered.Instance of a hyperlink hidden behind a… pic.twitter.com/NJLOD6aQiJ— 0x6rss (@0x6rss) January 10, 2026

How the Assault Unfolds

Attackers craft malicious proxy URLs and masks them as clickable usernames in chats or channels. A focused person clicks as soon as, triggering:

Automated proxy take a look at: Telegram sends a connectivity probe to the attacker’s server.

Proxy bypass: The request ignores SOCKS5, MTProto, or VPN setups, utilizing the gadget’s native community stack.

IP logging: Attacker’s server captures the supply IP, geolocation, and metadata.

Each Android and iOS purchasers are susceptible, affecting hundreds of thousands who depend on Telegram for privacy-sensitive communications. No person interplay past the press is required; it’s silent and efficient for doxxing, surveillance, or deanonymizing activists.

This flaw underscores dangers in proxy-heavy apps amid rising state-sponsored monitoring. Telegram, with over 950 million customers, has but to publicly patch it. Related bypasses have plagued apps like Sign prior to now.

Mitigations:

Disable auto-proxy detection in settings (if accessible).

Keep away from clicking on unknown usernames/hyperlinks.

Use firewall guidelines to dam outbound proxy pings (e.g., through Little Snitch on iOS or AFWall+ on Android).

Monitor for patches through Telegram’s changelog.

Researchers urge rapid fixes. Telegram didn’t reply to requests for remark by press time.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:1Click, Addresses, Android, Bypassing, Exposes, IOS, Proxies, Real, Telegram, Users

Post navigation

Previous Post: n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Next Post: Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package

Related Posts

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task Cyber Security News
Enhancing Security: The Role of Threat Intelligence Enhancing Security: The Role of Threat Intelligence Cyber Security News
Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Cyber Security News
500+ Apache Tika Toolkit Instances Vulnerable to Critical XXE Attack Exposed Online 500+ Apache Tika Toolkit Instances Vulnerable to Critical XXE Attack Exposed Online Cyber Security News
How To Defend Against These Phishing Kit Attacks  How To Defend Against These Phishing Kit Attacks  Cyber Security News
Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Silent Watcher Attacking Windows Systems and Exfiltrate Data Using Discord Webhook Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News