Hidden Telegram proxy links can reveal your IP address in one click
嗯,用户让我总结这篇文章,控制在一百个字以内,而且不需要特定的开头。我得先通读一遍,理解主要内容。 文章讲的是Telegram的一个安全漏洞。用户点击一个看起来像普通链接或用户名的东西,可能会泄露他们的真实IP地址。这是因为Telegram处理代理链接的方式有问题。 研究人员发现,当用户点击这些特殊链接时,Telegram客户端会自动尝试连接到代理服务器,这个过程不需要用户的进一步确认。攻击者可以利用这一点,设置自己的代理服务器,然后分发看起来无害的链接。一旦用户点击,攻击者就能记录下用户的IP地址。 Telegram对此的回应是添加警告信息,提醒用户注意这些代理链接。但目前还没有具体的解决方案时间表。 所以总结起来,关键点是:点击伪装的Telegram链接可能导致IP泄露,攻击者能利用这一点进行追踪或其他攻击。Telegram将添加警告。 现在我要把这些信息浓缩到100字以内,确保涵盖主要问题和解决方案。 </think> 点击伪装的Telegram链接可能泄露真实IP地址。研究人员发现,Telegram客户端在处理代理链接时会自动连接到指定服务器,攻击者可借此获取用户IP并进行追踪或攻击。Telegram将添加警告以提醒用户注意此类风险。 2026-1-12 16:30:26 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Telegram messenger

A single click on what may appear to be a Telegram username or harmless link is all it takes to expose your real IP address to attackers due to how proxy links are handled.

Telegram tells BleepingComputer it will now add warnings to proxy links after researchers demonstrated that specially crafted links could be used to reveal a Telegram user's real IP address without any further confirmation.

Careful with Telegram links

Security researchers have demonstrated this week that Telegram clients on both Android and iOS automatically attempt to connect to a proxy when a user taps a specially crafted internal link.

Wiz

These links can be disguised as ordinary usernames, for example, appearing as @durov in a Telegram message, but actually lead to a Telegram proxy link.

Telegram proxy links (t.me/proxy?...) are special URLs used to quickly configure MTProto proxies in Telegram clients. They allow users to add a proxy by clicking a link instead of manually entering server details:

https://t.me/proxy?server=[proxy IP address/hostname]&port=[proxy_port]&secret=[MTProto_secret]

When opened in Telegram, the app reads the proxy parameters (including the server, port, and secret), and prompts the user to add the proxy to their settings.

These links are widely shared to help users bypass network blocks or internet censorship and to conceal their real location, particularly in restrictive environments, making the feature valuable to activists, journalists, and others seeking anonymity.

On Telegram's Android and iOS clients, opening a proxy link also triggers an automatic test connection, causing the app to initiate a direct network request from the user's device to the specified server before the proxy is added.

Attackers can abuse this behavior by setting up their own MTProto proxies and distributing links that are visually disguised as harmless usernames or website URLs but actually point to proxy configuration endpoints.

If a user clicks such a link on a mobile client, the Telegram app will attempt to connect to the attacker-controlled server, allowing the proxy operator to log the user's real IP address.

The exposed IP address could then be used to infer a user's approximate location, launch denial-of-service attacks, or support other targeted abuse.

The issue was brought to light by a Russian-language Telegram channel, chekist42 at https://t.me/chekist42/139:

Telegram post that disclosed the issue
Telegram post that first disclosed the issue (BleepingComputer)

The proof-of-concept disguised link shown in the post was re-shared by an X account GangExposed RU, thereby drawing wider attention to the issue:

https://t[.]me/proxy?server=1.1.1.1&port=53&secret=SubscribeToGangExposed_int

"What happens next," explains the researcher, "[is that] Telegram auto-pings the proxy before adding it, the request bypasses all configured proxies, [and] your real IP is logged instantly."

"Silent and effective targeted attack."

0x6rss, a security research and OSINT account on X, further demonstrated the issue with a video PoC:

ONE-CLICK TELEGRAM IP ADDRESS LEAK!

In this issue, the secret key is irrelevant. Just like NTLM hash leaks on Windows, Telegram automatically attempts to test the proxy. Here, the secret key does not matter and the IP address is exposed.
Example of a link hidden behind a… https://t.co/KTABAiuGYI pic.twitter.com/NJLOD6aQiJ

— 0x6rss (@0x6rss) January 10, 2026

The researcher compared this behavior to NTLM hash leaks on Windows, where a single interaction with a crafted resource can trigger an automatic outbound request without user awareness.

In general, IP address disclosure can enable location tracking, profiling, and targeted attacks.

In this case, the flaw requires only a single click and no additional confirmation, making it suitable for targeted deanonymization.

Telegram downplays the issue, but will warn users

BleepingComputer contacted Telegram to ask whether it considers this behavior a vulnerability.

The company said that any website or proxy operator can see the IP address of visitors and that this is not unique to Telegram compared to other messaging platforms.

"Any website or proxy owner can see the IP address of those who access it regardless of platform," a Telegram spokesperson told BleepingComputer.

"This is not any more relevant to Telegram than WhatsApp or any other service that accesses the internet."

"That said, we're adding a warning that will show when clicking proxy links so users can be more aware of disguised links."

Telegram did not respond to follow-up questions about when the warning will be rolled out to client applications.

In the meantime, users are advised to be cautious with Telegram usernames and links that resolve to t.me domains, as clicking disguised proxy links could unintentionally reveal their real IP address.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/hidden-telegram-proxy-links-can-reveal-your-ip-address-in-one-click/
如有侵权请联系:admin#unsafe.sh