Hacking Telegram correspondence on iPhone, iPad, Macbook and other Apple devices
After launching a Telegram hacking session, the app logs into the compromised account on the virtual device. The software then retrieves and copies the entire correspondence history of the hacked account, and duplicates it in a third-party interface, TgHacker's Dashboard. Types of extracted data: Secret chats, incoming outgoing messages, location coordinates and movement history, incoming and outgoing call logs, address book contacts, list of files received and sent through iOS devices.