Follow @EthHackingNews |
Russian zero-day broker Operation Zero is now offering up to $4 million for exploits of the popular messaging app Telegram. The company's pursuit of these exploits highlights the growing demand from governments and intelligence agencies for secure access to sensitive information.
In a brazen move that has sent shockwaves through the cybersecurity community, Russian zero-day broker Operation Zero is now offering up to $4 million for exploits of the popular messaging app Telegram. This news comes as no surprise, given the growing concerns over Telegram's end-to-end encryption and its widespread use by journalists, activists, dissidents, and political figures.
According to reports from Tech Crunch, Operation Zero is exclusively selling exploits to the Russian government and local firms, with prices ranging from $500,000 for a one-click Remote Code Execution (RCE) to $4 million for a full-chain exploit that could allow for full device compromise. The company's scope includes exploits for Android, iOS, and Windows devices.
So why is Operation Zero willing to pay such high stakes for Telegram exploits? According to experts, the answer lies in the app's widespread use by various groups, including journalists, activists, dissidents, and political figures. Telegram's end-to-end encryption has made it a secure communication platform, but also a prized target for cyber espionage.
The Russian government's interest in Telegram is not new. In September 2024, Ukraine's National Coordination Centre for Cybersecurity (NCCC) banned the app on government agencies, military, and critical infrastructure, citing national security concerns. Kyrylo Budanov, the chief of Ukraine's Defence Intelligence, warned that Russian intelligence could spy on Ukrainian entities' personal correspondence, including deleted messages.
The ban on Telegram has had significant implications for users in Ukraine, who rely heavily on the app to communicate and receive news on ongoing conflicts. The situation is further complicated by reports that Russia-linked threat actors are actively using Telegram for cyberattacks, spreading phishing and malware, geolocating users, and adjusting missile strikes.
Zero-day prices have risen significantly as the level of security of messaging apps and mobile devices becomes harder to hack. This trend suggests that the value of exploits is increasing, driven by the growing demand from governments and intelligence agencies for secure access to sensitive information.
Operation Zero's pursuit of Telegram exploits is a reflection of this trend. The company's willingness to pay millions for high-quality exploits underscores the importance of secure communication platforms in today's digital landscape. As cybersecurity threats continue to evolve, it is likely that we will see more instances of government and intelligence agencies seeking out exploits to gain access to sensitive information.
For now, Operation Zero remains at the forefront of this cat-and-mouse game, with its eyes fixed on Telegram. Whether the company's efforts will yield success remains to be seen, but one thing is certain: the stakes are high, and the consequences of failure could be severe.
Follow @EthHackingNews |