Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click

Posted on January 12, 2026January 12, 2026 By CWS

A stealthy flaw in Telegram’s cell purchasers that lets attackers unmask customers’ actual IP addresses with a single click on, even these hiding behind proxies. Dubbed a “one-click IP leak,” the vulnerability turns seemingly innocuous username hyperlinks into potent monitoring weapons.

The problem hinges on Telegram’s computerized proxy validation mechanism. When customers encounter a disguised proxy hyperlink, typically embedded behind a username (e.g., t.me/proxy?server=attacker-controlled), the app pings the proxy server earlier than including it.

Crucially, this ping bypasses all user-configured proxies, routing instantly from the sufferer’s gadget and exposing their true IP. No secret secret is required, mirroring NTLM hash leaks on Home windows, the place authentication makes an attempt betray the consumer.

Cybersecurity skilled @0x6rss demonstrated an assault vector on X (previously Twitter) and shared a proof-of-concept: a 1-click Telegram IP Leak. “Telegram auto-pings the proxy earlier than including it,” they famous. “Request bypasses all configured proxies. Your actual IP is logged immediately.”

ONE-CLICK TELEGRAM IP ADDRESS LEAK!On this problem, the key secret is irrelevant. Similar to NTLM hash leaks on Home windows, Telegram mechanically makes an attempt to check the proxy. Right here, the key key doesn’t matter and the IP handle is uncovered.Instance of a hyperlink hidden behind a… pic.twitter.com/NJLOD6aQiJ— 0x6rss (@0x6rss) January 10, 2026

How the Assault Unfolds

Attackers craft malicious proxy URLs and masks them as clickable usernames in chats or channels. A focused person clicks as soon as, triggering:

Automated proxy take a look at: Telegram sends a connectivity probe to the attacker’s server.

Proxy bypass: The request ignores SOCKS5, MTProto, or VPN setups, utilizing the gadget’s native community stack.

IP logging: Attacker’s server captures the supply IP, geolocation, and metadata.

Each Android and iOS purchasers are susceptible, affecting hundreds of thousands who depend on Telegram for privacy-sensitive communications. No person interplay past the press is required; it’s silent and efficient for doxxing, surveillance, or deanonymizing activists.

This flaw underscores dangers in proxy-heavy apps amid rising state-sponsored monitoring. Telegram, with over 950 million customers, has but to publicly patch it. Related bypasses have plagued apps like Sign prior to now.

Mitigations:

Disable auto-proxy detection in settings (if accessible).

Keep away from clicking on unknown usernames/hyperlinks.

Use firewall guidelines to dam outbound proxy pings (e.g., through Little Snitch on iOS or AFWall+ on Android).

Monitor for patches through Telegram’s changelog.

Researchers urge rapid fixes. Telegram didn’t reply to requests for remark by press time.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:1Click, Addresses, Android, Bypassing, Exposes, IOS, Proxies, Real, Telegram, Users

Post navigation

Previous Post: n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Next Post: Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package

Related Posts

Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Top 10 Best Penetration Testing as a Service (PTaaS) Companies in 2025 Cyber Security News
Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware Beware of Fake Leonardo DiCaprio Movie Torrent File Drops Agent Tesla Malware Cyber Security News
Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data Threat Actors Weaponizing Facebook and Google Ads as Financial Platforms to Steal Sensitive Data Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details Cyber Security News
Hackers Accessed Email Account Contains Valid Credentials Hackers Accessed Email Account Contains Valid Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark