Skip to main content

This Week's Top Stories About Telegram Mtproxy Ddos Attacks – Peaks Up to 5,000 Requests Per Second

Telegram MTProxy

An Iranian based Cloud Infrastructure provider Arvan experienced a DDoS attack that peaks up to 5,000 Requests Per Second via Telegram MTProxy. The attack started on November 6 and lasts for 3 days.
The MTProxy was used by Telegram to bypass the Iranian filtering system as the Telegram banned in Iran. Several users started using MTProxy which makes difficult for the government authorities to restrict the traffic.

Attack With Telegram MTProxy

Arvan spotted huge traffic received using free MTProxy hit on their Edge server and the packets are not specific to any domain name and they are directly sent to the IP address.
The traffic received is completely random and has no similarities and it’s completely a new attack type and the traffic doesn’t follow any protocol patterns such as HTTP, HTTPS, FTP, and so on.
All the attack packets come within the Iranian IP and this huge amount of packets can disturb any server infrastructure the company says.
Arvan tried multiple ways to combat the attacks, but it fails, On Saturday the team detected that traffic was over telegram MTProxy service.
As the traffic is encrypted they behave like random traffic, widespread of the MTProxy service leads to the high volume of the distribution attack.
“Sending and using free MTProxy services on telegram channels is common and easy. It is easy to generate similar traffic by changing the IP address of one of these servers to the Arvan cloud address.”
Arvan stimulated the traffic via MTProxy service and the traffic is similar to the traffic received through DDoS attack.
By guessing the private key they able to decode the entire message, by checking with MTProxy service provider’s telegram channels they resolved to supercar and firewall gateway.
“Lack of a multifaceted approach to modern technologies has resulted in the removal of a messenger with millions of audiences, which has faced various threats at various times.” Avancloud said via blog post.
The proliferation of unauthorized copies of the telegram accusing Iranian users of personal devices was one of them, and now they use of free MTProxy, and its promotion poses another major threat to Iranian users.
We have recently reported, The secure messaging app Telegram hit by a powerful DDoS attack and the users in the united states and other countries may experience connection issues with Telegram.
These signs indicate that the hackers continuously abusing the Telegram channel and using it for various attacks.

Comments

Popular posts from this blog

10 Best Forum Software For Webmasters

10 Best Forum Software For Webmasters Do you want to create your online discussion forum or online community where people can discuss about their favorite topics? In this article, you can see 10 best forum software (scripts for setting up discussion forums) that can be used free of cost. Although some scripts are paid but rest of these forum scripts are free to use.You only need to buy hosting space and domain name for your website and after then you can install any of these forum scripts to start your own discussion forums on the internet. Online discussion forums generate huge page views because thousands of people want to join online discussion forums to ask questions or share knowledge. Some of online marketers join forums to discuss about their products with community members. You don't need to acquire any kind of technical skill to run a professional discussion forums because these days, almost all web hosting providers offer one click script installer which h...

How to Hack WhatsApp using just a GIF

A picture is worth a thousand words, but a GIF is worth a thousand pictures. Today, the short looping clips, GIFs are everywhere—on your social media, on your message boards, on your chats, helping users perfectly express their emotions, making people laugh, and reliving a highlight. But what if an innocent-looking GIF greeting with Good morning, Happy Birthday, or Merry Christmas message hacks your smartphone? Well, not a theoretical idea anymore. WhatsApp has recently patched a critical security vulnerability in its app for Android, which remained unpatched for at least 3 months after being discovered, and if exploited, could have allowed remote hackers to compromise Android devices and potentially steal files and chat messages. WhatsApp Remote Code Execution Vulnerability The vulnerability, tracked as  CVE-2019-11932 , is a double-free memory corruption bug that doesn't actually reside in the WhatsApp code itself, but in an open-source GIF image parsing library that What...

WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE

A high-severity vulnerability could allow cybercriminals to push malware or remotely execute code, using seemingly innocuous messages. Security researchers have identified a JavaScript vulnerability in the WhatsApp desktop platform that could allow cybercriminals to spread malware, phishing or ransomware campaigns through notification messages that appear completely normal to unsuspecting users. And, further investigation shows this could be parlayed into remote code-execution. The desktop platform has more than 1.5 billion monthly active users. The high-severity bug (rated 8.2 on the CVSS severity scale) could impact those that also use WhatsApp for iPhone, if they don’t update their desktop and mobile apps, and if they don’t use newer versions of the Chrome browser. “A vulnerability [ CVE-2019-18426 ] in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting (XSS) and local file reading,” acc...