Company Details
telegram-messenger
2,158
48,408
None
telegram.org
0
TEL_7684797
In-progress

Telegram Messenger Company CyberSecurity Posture
telegram.orgPure instant messaging — simple, fast, secure, and synced across all your devices.
Company Details
telegram-messenger
2,158
48,408
None
telegram.org
0
TEL_7684797
In-progress
Between 750 and 799

Telegram Messenger Global Score (TPRM)XXXX

Description: A resurgence of the CVE-2024-7014 vulnerability termed 'Evilloader,' exploiting Telegram's Android client through a revised tactic involving disguised .htm files, led to unauthorized JavaScript execution. The attackers leveraged Telegram's multimedia framework and manipulated metadata headers to distribute the malicious files. Victims, deceived into playing a pseudo-video file, inadvertently trigger JavaScript execution in their browsers when redirected by a content:// URI scheme. This exploit, primarily targeting unpatched versions of Telegram (≤10.14.4), facilitated data exfiltration and malware activities such as phishing and banking Trojans. Telegram's delayed response in enforcing robust file validation has instigated significant risks to user data integrity and privacy.


No incidents recorded for Telegram Messenger in 2025.
No incidents recorded for Telegram Messenger in 2025.
No incidents recorded for Telegram Messenger in 2025.
Telegram Messenger cyber incidents detection timeline including parent company and subsidiaries

Pure instant messaging — simple, fast, secure, and synced across all your devices.


Türk internet kullanıcılarının en çok tercih ettiği dijital platform olan Mynet, 1999 yılından bugüne liderliğini koruyor. Kendi alanında sayısız ilki gerçekleştiren öncü internet devi Mynet, Türkiye'nin dijital ekosisteminin kalkınmasına ve gelişmesine destek olmayı sürdürüyor. Her ay ortalama 4
Thirteen-time Webby award-winning Freelancer is the world’s largest freelancing and crowdsourcing marketplace by total number of users and projects posted. More than 80 million registered users have posted over 25 million projects and contests to date in over 3,000 areas as diverse as website develo
OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thi

The mission of the Death Star is to keep the local systems "in line". As we have recently dissolved our Board of Directors, there is little resistance to our larger goal of universal domination. Our Stormtroopers are excellent shots and operate with our Navy, and are fielded like marines - sep
Cimpress plc (Nasdaq: CMPR) invests in and builds customer-focused, entrepreneurial, mass-customization businesses for the long term. Mass customization is a competitive strategy which seeks to produce goods and services to meet individual customer needs with near mass production efficiency. Cimpr

At Myntra, we don’t just follow fashion - we define it. As India's leading fashion, lifestyle, and beauty destination, we bring together the best of style, technology, and innovation to create a seamless shopping experience for our customers. With a commitment to empowering self-expression, we cura

Avnet is a global electronic components distributor with extensive design, product, marketing and supply chain expertise for customers and suppliers at every stage of the product lifecycle. For the past 100 years, Avnet has helped its customers and suppliers around the world realize the transformati

At Flipkart, we're driven by our purpose of empowering every Indian's dream by delivering value through innovation in technology and commerce. With a customer base of over 350 million, product coverage of over 150 million across 80+ categories, a focus on generating direct and indirect employment an
.png)
How private and secure are your end-to-end encrypted instant messages? Not so much when Sturnus attacks.
The agency's rare warning about spyware activity comes as it updated mobile security guidance to reflect evolving threats.
In Uzbekistan, around 40 percent of Telegram users are encountering incidents in which funds are withdrawn from their bank cards or their...
Manufacturing, government, telecommunications, energy, automotive, and professional services organizations in Germany, Hungary, Slovakia,...
"Dark Web Telegram Groups aren't quite the Wild West for hacktivists and cybercriminals that they were a little over a year ago, but it's still an important...
Active WSUS exploits, LockBit 5.0's comeback, a Telegram backdoor, and F5's hidden breach — this week's biggest cyber threats.
A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger...
A new Android threat is spreading fast through fake versions of Telegram X, giving attackers complete control over users' accounts.
Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Telegram Messenger is https://www.telegram.org.
According to Rankiteo, Telegram Messenger’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, Telegram Messenger currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Telegram Messenger is not certified under SOC 2 Type 1.
According to Rankiteo, Telegram Messenger does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Telegram Messenger is not listed as GDPR compliant.
According to Rankiteo, Telegram Messenger does not currently maintain PCI DSS compliance.
According to Rankiteo, Telegram Messenger is not compliant with HIPAA regulations.
According to Rankiteo,Telegram Messenger is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Telegram Messenger operates primarily in the Technology, Information and Internet industry.
Telegram Messenger employs approximately 2,158 people worldwide.
Telegram Messenger presently has no subsidiaries across any sectors.
Telegram Messenger’s official LinkedIn profile has approximately 48,408 followers.
Yes, Telegram Messenger has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/telegram-messenger.
Yes, Telegram Messenger maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telegram-messenger.
As of December 22, 2025, Rankiteo reports that Telegram Messenger has experienced 1 cybersecurity incidents.
Telegram Messenger has an estimated 13,273 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Title: Evilloader Exploit on Telegram Android Client
Description: A resurgence of the CVE-2024-7014 vulnerability termed 'Evilloader,' exploiting Telegram's Android client through a revised tactic involving disguised .htm files, led to unauthorized JavaScript execution. The attackers leveraged Telegram's multimedia framework and manipulated metadata headers to distribute the malicious files. Victims, deceived into playing a pseudo-video file, inadvertently trigger JavaScript execution in their browsers when redirected by a content:// URI scheme. This exploit, primarily targeting unpatched versions of Telegram (≤10.14.4), facilitated data exfiltration and malware activities such as phishing and banking Trojans. Telegram's delayed response in enforcing robust file validation has instigated significant risks to user data integrity and privacy.
Type: Vulnerability Exploit
Attack Vector: Disguised .htm files leading to unauthorized JavaScript execution
Vulnerability Exploited: CVE-2024-7014
Motivation: Data ExfiltrationPhishingBanking Trojans
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Disguised .htm files.

Systems Affected: Telegram Android Client
Brand Reputation Impact: Significant risks to user data integrity and privacy

Entity Name: Telegram
Entity Type: Messaging Application
Industry: Technology

Data Exfiltration: Yes

Entry Point: Disguised .htm files

Root Causes: Delayed response in enforcing robust file validation
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Disguised .htm files.
.png)
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.