[!(https://thehackernews.com/images/-7QdjpluumWc/YCtFasnxBaI/AAAAAAAABxM/Wt8brTpacd43OsnvdRdjvo2xil-rp1sbgCLcBGAsYHQ/s0/telegram-hacking.jpg)](<https://thehackernews.com/images/-7QdjpluumWc/YCtFasnxBaI/AAAAAAAABxM/Wt8brTpacd43OsnvdRdjvo2xil-rp1sbgCLcBGAsYHQ/s0/telegram-hacking.jpg>) Cybersecurity researchers on Monday disclosed details of a now-patched flaw in the Telegram messaging app that could have exposed users' secret messages, photos, and videos to remote malicious actors. The issues were discovered by Italy-based [Shielder](<https://www.shielder.it>) in iOS, Android, and macOS versions of the app. Following responsible disclosure, Telegram addressed them in a series of patches on September 30 and October 2, 2020. The flaws stemmed from the way secret chat functionality operates and in the app's handling of [animated stickers](<https://telegram.org/blog/animated-stickers>), thus allowing attackers to send malformed stickers to unsuspecting users and gain access to messages, photos, and videos that were exchanged with their Telegram contacts through both classic and secret chats. One caveat of note is that exploiting the flaws in the wild may not have been trivial, as it requires chaining the aforementioned weaknesses to at least one additional vulnerability in order to get around security defenses in modern devices today. That might sound prohibitive, but, on the contrary, they are well in the reach of both cybercrime gangs and nation-state groups alike. Shielder said it chose to wait for at least 90 days before publicly revealing the bugs so as to give users ample time to update their devices. "Periodic security reviews are crucial in software development, especially with the introduction of new features, such as the animated stickers," the [researchers said](<https://www.shielder.it/blog/2021/02/hunting-for-bugs-in-telegrams-animated-stickers-remote-attack-surface/>). "The flaws we have reported could have been used in an attack to gain access to the devices of political opponents, journalists or dissidents." It's worth noting that this is the second flaw uncovered in Telegram's secret chat feature, following [last week's reports](<https://thehackernews.com/2021/02/secret-chat-in-telegram-left-self.html>) of a privacy-defeating bug in its macOS app that made it possible to access self-destructing audio and video messages long after they disappeared from secret chats. This is not the first time images, and multimedia files sent via messaging services have been weaponized to carry out nefarious attacks. In March 2017, researchers from Check Point Research [revealed](<https://blog.checkpoint.com/2017/03/15/check-point-discloses-vulnerability-whatsapp-telegram/>) a new form of attack against web versions of Telegram and WhatsApp, which involved sending users seemingly innocuous image files containing malicious code that, when opened, could have allowed an adversary to take over users' accounts on any browser completely, and access victims' personal and group conversations, photos, videos, and contact lists. Found this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter __](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.