Taking 'Telega' apart: the only free cheese is in a mousetrap
Hack Time, Habr!
The other day, I came across a high-profile investigation by Dmytro Tarasenko (aka iTaysonLab).
He was the one who decompiled the APK of the new 'Telega' app, identified links to the VK and Catogram infrastructure, and published the details on the BruhCollective Telegram channel.
My colleagues uncovered many alarming facts, but as someone who loves to dig into the guts of applications, I wanted to go further, confirm their findings, and find what dynamic analysis missed.
I decided to conduct a full static analysis of the APK, deobfuscating the code to create the most complete and technically supported picture possible.
What is really hiding behind the promises of an 'improved' Telegram?
Let's take a look.
Spoiler: it's not secure, not private, but it's damn interesting. Let's go!















