WhatsApp's Rival Telegram Is Prone To Hacking Through Voicemail Backdoor
Chitanis - Aug 05, 2019
Last week, 4 suspects were arrested for hacking into more than 1,000 Telegram accounts – WhatsApp’s rival.
- 3.2 Billion Email And Password Pairs Have Been Leaked, Here's How To Check If You Are Affected
- Watch This Man Hack 26 iPhones At The Same Time Without Even Touching Them
- China Attacked Indian Satellite Systems Several Times In The Last Decade
Telegram has rightly been famous for protecting its users’ privacy with high privacy. However, according to recent reports, the company definitely cannot prevent targeted hacking. Last week, four suspects were arrested for hacking into more than 1,000 accounts of Telegram. The account holders which were hacked into include not only Ministers Paulo Guedes and Sergio Moro, but also Jair Bolsonaro, Brazil’s President. Four suspects were alleged to use an uncommon trick to hack into their target accounts from their mobile phones.

As reported by Naked Security, Telegram is prone to account takeover by hackers, especially when these hackers are pretending to be the user to receive a new phone SIM along with the phone number of their targets. Finally, after downloading Telegram and using the verification system through SMS, the account is taken over.
Nevertheless, according to Naked Security, hacking through voicemail is another method, which is why many people couldn’t protect their own accounts because they actually didn’t know that their voicemail was exploited and also, voicemail isn’t provided as a service in Telegram.

Walter Delgatti Neto – 30 years old – is a suspect who was arrested. Reportedly, he testified that the hackers got the SMS verification via voicemail. It is quite easy to get access to voicemail because many people do not remember to set up 4-digit codes. Whereas, people setting 4-digit codes can feel disappointed because of miscreants along with their tools at the disposal in case they want. Whilst voicemail has been designed to check whether the accessing call’s number belongs to their subscriber or not, it is easier for those numbers to be “spoofed” when the hacker gets the right one.

Therefore, the hackers, who can gain entry to voicemail, can also get access to Telegram’s SMS verification because those verification messages are sent to the victim’s voicemail when he or she cannot answer three times in a row or is having a call.
At DEFCON 2018, a presentation stated that Telegram isn’t the only security service that may be susceptible to this kind of risk. Any security service which allows verification messages to be sent through voicemail is endangered.
Ways to protect each user from these attacks
After Telegram has seen the vulnerability, the company has already updated to prevent these attacks. Now, users can request a code for login via a phone call only after 2-step verification which requires a code and password.

The report said it's advisable for users to turn on 2-factor or 2-step verification (if available) for any messaging service that they use. Moreover, in case the user is accidentally using voicemail, they should ensure that the voicemail is protected with a randomly generated PIN.
Featured Stories
ICT News - Jul 05, 2025
Windows 11 is Now the Most Popular Desktop OS in the World
ICT News - Jul 02, 2025
All About Florida’s Alligator Alcatraz: A Smart Move for Immigration Control
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
ICT News - Jun 24, 2025
Tesla Robotaxi Finally Hits the Streets: $4.20 Rides That'll Make You Hold Your...
ICT News - Jun 24, 2025
World's First Flying Humanoid Robot Takes Flight
ICT News - Jun 24, 2025
When Closed Source Met Open Source: Bill Gates Finally Meets Linus Torvalds After...
Gadgets - Jun 23, 2025
COLORFUL SMART 900 AI Mini PC: Compact Power for Content Creation
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
ICT News - Jun 20, 2025
Tesla vs Zoox vs Waymo: Who would win?
ICT News - Jun 19, 2025
Comments
Sort by Newest | Popular