• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Android Messenger App Still Leaking Photos, Videos

Android Messenger App Still Leaking Photos, Videos

You are here: Home / Latest Cyber Security Vulnerabilities / Android Messenger App Still Leaking Photos, Videos

The GO SMS Pro app has been downloaded 100 million instances now, underground forums are actively sharing illustrations or photos stolen from GO SMS servers.

The GO SMS Pro Android app has published two new variations on Google Enjoy considering that a key security weak spot was disclosed in November – but neither fixes the original issue, leaving 100 million consumers at risk for privacy violations, researchers reported.

Meanwhile, a raft of exploitation equipment have been unveiled in the wild for the bug.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
F Secure Safe 2021

Protect yourself against all threads using F-Seure. F-Seure is one of the first security companies which has never been backed up by any governments. It provides you with an award-winning security plus an optimum privacy.

Get F-Secure Safe with 65% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


That is according to Trustwave SpiderLabs, which at first found out a security issue that can be exploited to publicly expose non-public voicemails, video missives and photographs despatched applying the common messenger application.

With GO SMS Pro, when a person sends a multimedia message, the recipient can acquire it even if they really don’t them selves have the application set up. In that circumstance, the media file is sent to the receiver as a URL by using SMS, so the human being can simply click on the website link to check out the media file in a browser window. The issue is that there’s no authentication expected to check out the written content, so any one with the backlink (and back links can be guessable) can click via to the articles.

“With some really minor scripting, it is trivial to toss a broad net close to that information,” according to Trustwave. “While it’s not immediately probable to url the media to specific consumers, these media data files with faces, names, or other identifying properties do that for you.”

Some of the available-to-be-hacked information. Source: Trustwave.

A new version of the app was uploaded to the Enjoy Retail outlet the working day ahead of the primary Trustwave advisory on Nov. 19 adopted promptly by a 2nd up-to-date edition on Nov. 23. Trustwave has now examined the two variations, exclusively v7.93 and v7.94.

“We can confirm that more mature media made use of to verify the unique vulnerability is nonetheless out there,” scientists discussed in a Tuesday publishing. In other phrases, earlier messages that have been sent are however available. “That includes rather a little bit of sensitive info like driver’s licenses, overall health insurance policies account quantities, authorized files, and of study course, shots of a a lot more ‘romantic’ mother nature.”

Regretably, cybercrooks have been fast to exploit the challenge, with “more instruments and scripts produced to exploit this on web sites like Pastebin and Github than you can shake a adhere at,” according to Trustwave. “Several well-known resources are updating day by day and on their third or fourth revision. We’ve also observed underground discussion boards sharing pictures downloaded from GO SMS servers immediately.”

As for the new versions, “It appears like [the developer] is making an attempt to take care of the issue, but a comprehensive take care of is however not accessible in the app,” scientists spelled out. “For v7.93, it seems that they disabled the skill to deliver media documents totally. We ended up not even equipped to attach files to an MMS message. In v7.94, they are not blocking the capability to add media in the app, but the media does not show up to go anywhere…the receiver does not get any actual text both with or without hooked up media. So, it seems they are in the course of action of trying to repair the root difficulty.”

Trustwave stated that it nonetheless has experienced no speak to from the GO SMS Pro group.

“Our only avenue is public training to retain consumers from continuing to risk their delicate images, video clips and voice messages,” researchers stated. “Given that outdated info is however at risk and remaining actively leaked, in addition to the lack of interaction or whole fixes, we also feel it would be a good thought for Google to acquire this app again down.”

GO SMS Pro did not promptly return a ask for for comment.

Place Ransomware on the Operate: Save your location for “What’s Subsequent for Ransomware,” a FREE Threatpost webinar on Dec. 16 at 2 p.m. ET. Find out what is coming in the ransomware environment and how to combat back again. 

Get the most recent from John (Austin) Merritt, Cyber Risk Intelligence Analyst at Electronic Shadows, and other security gurus, on new forms of attacks. Subject areas will consist of the most hazardous ransomware threat actors, their evolving TTPs and what your corporation needs to do to get in advance of the upcoming, inevitable ransomware attack. Register here for the Wed., Dec. 16 for this LIVE webinar.

 


Some components of this write-up are sourced from:
threatpost.com

Previous Post: «Cyber Security News Bomb Threat Hacker Gets 8-Year Prison Sentence
Next Post: Misconfigured Docker Servers Under Attack by Xanthe Malware Misconfigured Docker Servers Under Attack By Xanthe Malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Big Tech Bans Social Networking App
  • Lack of Funding Could Lead to “Lost Generation” of Cyber-Startups
  • Unveiled: SUNSPOT Malware Was Used to Inject SolarWinds Backdoor
  • ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform
  • DarkSide decryptor unlocks systems without ransom payment – for now
  • Researchers see links between SolarWinds Sunburst malware and Russian Turla APT group
  • Millions of Social Profiles Leaked by Chinese Data-Scrapers
  • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
  • SolarWinds Hack Potentially Linked to Turla APT
  • 10 quick tips to identifying phishing emails

Copyright © TheCyberSecurity.News, All Rights Reserved.