Privacy on Telegram: Fact or Fiction?

April 7, 2025

Telegram: From Growth to Controversy

In an era where digital privacy is constantly under scrutiny, Telegram has risen as a dominant messaging platform, praised for its speed, large-scale group capabilities, and resistance to censorship.  

Founded in 2013 by Pavel Durov and headquartered in Dubai, Telegram is a cloud-based messaging app known for its seamless cross-device functionality. The platform allows users to send text messages, make voice and video calls, and share multimedia files and documents with ease. Its popularity has surged, particularly in countries with stringent censorship laws, due to its minimal content moderation and resistance to governmental restrictions make it a preferred choice for unrestricted communication.   While the platform has skyrocketed past one billion monthly active users, its rapid growth has come with a dark side, ranging from security flaws and cybercriminal exploitation to legal crackdowns. A recent zero-day vulnerability in its Android app sent shockwaves through the cybersecurity world, while reports surfaced of illicit cryptocurrency transactions and underground marketplaces thriving on the platform.  

Adding fuel to the fire, Telegram’s founder, Pavel Durov, was arrested in France over allegations of enabling criminal activity, forcing the company to rethink its stance on law enforcement cooperation. In response to mounting pressure, Telegram has taken aggressive action, removed millions of illicit groups and deployed AI-powered moderation tools to curb abuse. But with these developments unfolding, the question remains: can Telegram maintain its reputation as a secure and private messaging app, or is it at risk of losing its edge? This report takes a deep dive into the platform’s latest controversies, its efforts to combat misuse, and what the future holds for its users.

Key Features of Telegram

Privacy Features offered by Telegram

Limitations to Consider Before Choosing Telegram

Cybercrime on Telegram: A Growing Concern

While Telegram is widely recognized for its secure messaging and privacy features, these very attributes have also made it a preferred platform for illicit activities. Criminal networks, scammers, and cybercriminals exploit its encryption, anonymity, and expansive reach to engage in illegal operations with minimal risk of detection. From drug trafficking to financial fraud, Telegram has become a digital underworld where unlawful transactions take place beyond the watchful eyes of authorities.  

Notable criminal activities taking place on Telegram:

Illicit Uses of Telegram

Known Exploited Vulnerabilities in Telegram

Vulnerability Description Exploited in the Year
Evilloader Despite a patch for CVE-2024-7014, an evolved variant known as Evilloader emerged, bypassing previous security measures and exploiting Telegram's multimedia handling to execute malicious JavaScript code. 2025
CVE-2024-7014 Also known as the “EvilVideo Vulnerability,” this flaw allowed attackers to disguise malicious files as video content, leading to unauthorized code execution on Android devices. 2024
CVE-2023-26818 This vulnerability allowed attackers to access restricted files and activate device microphones and cameras by manipulating the DLYD_INSERT_LIBRARIES environment variable. 2023
CVE-2021-40532 This vulnerability in the Telegram Web K Alpha involves improper handling of characters in document extensions, which can be exploited by attackers to execute arbitrary code. 2021
CVE-2020-17448 This vulnerability allows attackers to bypass Telegram's Dangerous File Type Execution protection mechanism by sending files without extensions through the chat window. 2020
CVE-2019-10044 This vulnerability allows for Internationalized Domain Name (IDN) homograph attacks, where malicious URLs containing characters from different alphabets (e.g., Latin and Cyrillic) are displayed as clickable links within messages. 2019
CVE-2018-17613 This is a vulnerability in Telegram where user credentials and data are sent in cleartext over SOCKS5 when the "Use proxy" feature is enabled. 2018
CVE-2018-20436 This vulnerability is associated with the "secret chat" feature in Telegram. The issue arises when Telegram servers send GET requests for URLs typed by users while composing a chat message, even before the message is sent. 2018
CVE-2017-17715 This vulnerability in Telegram Messenger allows remote attackers to overwrite arbitrary files via crafted file-transfer requests. 2017
Vulnerability in Cryptographic Protocol This vulnerability in Telegram's cryptographic protocol compromised essential data security guarantees, potentially allowing unauthorized access to user communications. 2021
Vulnerability in Animated Stickers Vulnerability in animated stickers allowed remote code execution and unauthorized data access. 2021

How Telegram Fights Back Against Cybercrime

Tips to enhance your safety on Telegram

Closing Thoughts: Can Telegram Evolve for the Better?

Telegram stands as a double-edged sword in the digital communication landscape, praised for its speed, massive group support, and resistance to censorship, yet frequently for its security loopholes and misuse by bad actors. While the platform continues to take measures to curb illicit activities and enhance security, users must remain cautious and proactive in protecting their data. Understanding these limitations allows individuals to make informed decisions about using Telegram while urging the platform to strengthen its security and privacy measures. By addressing these shortcomings, Telegram can refine its user experience, build greater trust, and maintain its competitive edge in the ever-evolving digital communication space.

Sources Cited:

  1. https://vpnoverview.com/privacy/apps/telegram-vs-whatsapp/
  2. https://www.larksuite.com/en_us/blog/telegram-vs-whatsapp
  3. https://www.geeksforgeeks.org/telegram-vs-whatsapp/
  4. https://www.makeuseof.com/reasons-stop-using-telegram/
  5. https://protonvpn.com/blog/is-telegram-safe
  6. https://www.avast.com/c-is-telegram-safe
  7. https://thehackernews.com/2024/08/telegram-founder-pavel-durov-arrested.html  
  8. https://thehackernews.com/2024/09/telegram-agrees-to-share-user-data-with.html  
  9. https://quickblox.com/blog/is-telegram-secure-what-it-takes-to-build-a-secure-messaging-app/  
  10. https://www.nytimes.com/2024/09/07/technology/telegram-crime-terrorism.html  

About Loginsoft

For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science & AI, etc.

Expertise in Integrations with Threat Intelligence and Security Products: Built more than 250+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar & Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc.

In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions.

Interested to learn more? Let’s start a conversation.

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

BLOGS AND RESOURCES

Latest Articles