SlideShare uma empresa Scribd logo
1 de 56
Baixar para ler offline
Introducing Man In The
Contacts attack to trick
encrypted messaging apps
Cyber Securtiy Conference #CYBSEC16
03/11/2016 – Securing Apps
whois securingapps
Developer background
Spent last 10 years working in Switzerland on security products
and solutions
Focus on mobile since 2010
Now software security consultant at my own company
http://www.securingapps.com
Provide services to build security in software
Mobile
Web
Cloud
Internet Of Things
Bitcoin/Blockchain @SecuringApps
Introduction
Popular messaging apps recently switched to End-to-End
encryption
Great communication around it
Privacy now is a requirement
Debates at the government level to ask for backdoors
Going dark ?
Used by terrorists ?
Increased feeling that those applications are unbreakable
Super crypto. But wait ….
Advanced ratcheting in Signal Protocol à
Looks like an obvious flaw won’t be there
But how messaging apps authenticate myself ?
No explicit identifier
Provisioning done via SMS
Link to device/phone number
And when I change phone number ?
And my contacts ?
Get them from my address book
No manual contact handling (e.g. Skype)
Threat model: mobile focus & simplified
Other app
Messaging	
app
Mobile	OS
Contacts
S
t
o
r
a
g
e
N
e
t
w
o
r
k
Messaging
backend
E2E	encryption
SMS	init codeSMS	init code
messages
messages
backups
Accessing contacts
Easy to read/modify/create contacts
There is an API for that
Android example
Shared data structure accessible in read/write
Only restricted by permissions
And it contains authentication data in clear !
There is room for a side channel attack: Man In The Contacts
Not requiring a rooted device (e.g no RowHammer attack)
Introducing Alice, Bob and Eve
Convention: Alice on the left, Bob on the right, Eve in the center
Devices not rooted, latest OS updates available
Installed apps: latest version (29th October 2016) of
WhatsApp, Telegram and Signal
Android	5.0 Android	5.1iOs 10.1
Alice Eve Bob
+33 X XX XX XX 60 +41 XX XXX XX 21 +41 XX XXX XX 66
Old joke: swap contacts
Install MITC app on Bob’s device
Start a conversation between
Alice and Bob
Swap Alice and Eve phone numbers
on Bob’s device
See what happens
Bob
Old joke: swap contacts
WhatsApp 1
Bob starts a conversion with Alice
Alice answers
Bob
Old joke: swap contacts
WhatsApp 2
Eve triggers contact swap via
remote MITC app on Bob’s device
Eve sends «This is eve» to Bob
Notification received as Alice
But new conversation
Bob
Old joke: swap contacts
WhatsApp 3
Ignore notification
Conversation of Alice now displayed
as Eve
Bob
Old joke: swap contacts
WhatsApp 4
Accept notification
Eve triggered a new conversation
But displayed as Alice
Bob
Old joke: swap contacts
Telegram 1
Bob starts a conversion with Alice
Alice answers
Bob
Old joke: swap contacts
Telegram 2
Eve triggers contact swap via
remote MITC app on Bob’s device
Eve sends «This is Eve» to Bob
Notification received as Alice
But new conversation
Bob
Old joke: swap contacts
Telegram 3
Accept notification
Eve triggered a new conversation
But displayed as Alice
NB: If you change the name of
Alice, in the future notifications and
conversations will still be under the
name of Alice
Bob
Old joke: swap contacts
Signal 1 & 2
Screenshots refused by Android app
But same behaviour than WhatsApp
Bob
Old joke: swap contacts
Signal 3
Accept notification
Eve triggered a new conversation
Displayed as Alice
But phone number also displayed
(the iOs version doesn’t display it)
Bob
Old joke: swap contacts
Signal 4
Not the case in the main view
Bob
Old joke: swap contacts
Signal 5
Stay in this view
Switch back contacts with MITC app
Nothing happens for a while
And then main view updated
=> contact sync process
Bob
Swap contacts results
Can’t be used to trick Bob within an existing conversation
But produces a notification and a new conversation that may
seem legitimate to Bob
Different behaviors depending on the app
Name in the notification vs name in the conversation
Name configured by the sender vs contact name as seen by receiver
Contact sync time
Not discrete in case Alice and Bob have a phone call
or send a message
Nasty trick: contact with similar name
Start a conversation between
Alice and Bob
Create a contact name « Alice» on Bob’s
device with Eve’s phone number
See how the whitespace in front of
Alice gets displayed
Bob
Nasty trick: contact with similar name
WhatsApp 1
Alice starts a conversion with Bob
Bob
Nasty trick: contact with similar name
WhatsApp 2
Eve starts a conversion with Bob
Bob
Nasty trick: contact with similar name
WhatsApp 3
Main view
Bob
Nasty trick: contact with similar name
WhatsApp 4
Conversation with real Alice
Bob
Nasty trick: contact with similar name
WhatsApp 5
Conversation with Eve as « Alice»
Bob
Nasty trick: contact with similar name
Telegram 1
Alice starts a conversion with Bob
Bob
Nasty trick: contact with similar name
Telegram 2
Eve starts a conversion with Bob
Bob
Nasty trick: contact with similar name
Telegram 3
Main view
Bob
Nasty trick: contact with similar name
Telegram 4
Conversation with real Alice
Bob
Nasty trick: contact with similar name
Telegram 5
Conversation with Eve as « Alice»
Bob
Nasty trick: contact with similar name
Signal 1
Alice starts a conversion with Bob
Bob
Nasty trick: contact with similar name
Signal 2
Eve starts a conversion with Bob
Bob
Nasty trick: contact with similar name
Signal 4
Conversation with real Alice
Bob
Nasty trick: contact with similar name
Signal 5
Conversation with Eve as « Alice»
Bob
Nasty trick: contact with similar name
Signal 3
Main view
Bob
Contact with similar name results
Creating « Alice» in addition to Alice is far more discrete
Phone call/SMS OK with real contact
Whitespace prefix is not visible in messaging apps
Requires a new contact, but MITC app can delete/recreate
« Alice» as often as needed
Why does it work ?
Design error from a security point of view: phone number poor identifier
Abusing TOFU: new contact = new key = accepted by default
End user/mobile not really included in threat model
Focus on protecting network/backend (e.g. against government agencies)
Side channel attack with some social engineering out of scope
Yet after a few messages, Bob can guess it is not really Alice
speaking to him
Building an attack scenario with MITC
Let’s build an easy exploitation scenario
Convinced many more similar attacks are possible
Look in detail in the implementations how contacts are handled
Reverse engineering for WhatsApp/Telegram
Highly likely Java readable code for handling the Android contacts
Open source code for Signal
Extra identifiers stored in contacts: they can also be modified !
Suppose Alice also installed the MITC app
because it’s very popular
or MITC app sends her a SMS recommending to do so
because it found her in Bob’s contacts
Man In The Middle: init phase
1. Have MITC deployed
on the devices of Alice
and Bob
2. Login as Eve to web
version of messaging
app
3. Create « Alice» and
« Bob» with Eve’s phone
number via MITC app
BobAlice Eve
Man In The Middle: provoke discussion 1
BobAlice Eve
Man In The Middle: provoke discussion 2
BobAlice Eve
Man In The Middle: discussion 1
BobAlice Eve
Man In The Middle: discussion 2
BobAlice Eve
Man In The Middle: discussion 3
BobAlice Eve
Man In The Middle: discussion 4
BobAlice Eve
Man In The Middle: discussion 5
BobAlice Eve
Man In The Middle results
WhatsApp
Possible to share a real conversation between Bob and Alice via Eve
Only need to switch to a new conversation by forcing a chat
Later conversations will likely continue in this session (UI easiest path)
Telegram: same results (web version also available),
as long as the new contacts are used for the first time
Signal: same results
Phone number always displayed below contact name
(Android version only)
Risk assessment
Simple evaluation: risk = easiness of attack * user impact
Difficulty of attack: Low-Medium
Technically: Low
Easy to access contacts via code
Not a problem to get MITC application approved for publication
Logistics : Medium
One phone number is enough
Need to convince many users to install the MITC application
But « Ponzi scheme » possible by using the contact information
Impact: High
Thousands of users can be spied: multi-app + multi-mobile os
Vendors feedback 1/4
Telegram
Very efficient Level 1 support (a contact in Telegram app)
Level 2: security@telegram.org = /dev/null
Contacted them 3 times
Asked Level 1 to recontact them
Public question via Twitter
WhatsApp
Contact Facebook security via form => automatic confirmation
No answer for one month
Recontacted them: answer received the next day
Replied to it, but never got feedback
Vendors feedback 2/4
WhatsApp answer (layout as is, bold added)
We appreciate your report. Ultimately an attacker with malware installed on
a device is going to be able to alter data on the device itself. In your
examples for WhatsApp conversations remained properly bound to the
phone number that the messages were sent to. Beyond that, WhatsApp
allows people to set local aliases for contacts and to view the number
associated with a specific message thread at any point. Given that, we don't
feel that this behavior poses a significant risk and we do not plan to make any
changes here. Please let us know if you feel we've misunderstood something
here!
Vendors feedback 3/4
Signal
Not clear what is the channel for security issues
Create report for Android app in Signal bug tracking tool
Recontacted twice but no answer for 2 months
Public question via Twitter
Quick answer from support
Someone from tech team will contact me soon
After recontacting support, discussion started
Vendors feedback 4/4
Signal 1st reply (layout as is, bold added)
Hey	Jeremy,	saw your support	email	about	"man	in	the	contacts."	 This,	like
all	interception	techniques,	is what safety numbers are	for. Signal	users
would be notified that the	safety numbers for	their contact	have	changed,	
and	be asked to	verify them. A	successful MITM	attack would need to	find a	
way to	intercept communication	without triggering that notice.
Signal 2nd reply (layout as is, bold added)
Hey	Jeremy,	Signal	is not	designed to	protect your device against
malware. Thanks for	getting in	touch,	good	luck with everything.
Countermeasures: mobile apps
Give up the implicit trust on contacts
Deal with contacts the old way
Provide an explicit identifier + authentifier
Manually approve contacts to be added
Or mitigate risk by increasing user awareness
Clear message when a new conversation starts explaining to be
cautious
Ideally warning sign in the corresponding notification
Display a visible trust level indicator next to the contact name
If no chat history for this number/key, trust level set to minimum
Phone number can help (if people know the numbers by heart …)
Mobile OS: stronger restrictions for accessing contacts
Countermeasures: end user
Check your contacts
Avoid installing applications asking for modify contacts
permission
Yes messagins apps ask for this permission …
Use Threema
Swiss German app
Manual id handling
Optional contact sync
Visible trust level: Red/Orange/Green
Questions on contacts handling sent to press@threema.ch
Very detailed answer with the clear design choices received the next day
Conclusion
E2E can’t guarantee privacy if you’re not sure who you’re talking to
Beware of messages displaying good cryptography is used because it
can bring a false sense of security
Security model around contacts is far too open for sensitive apps
Authenticating the other party is an absolute necessity
But it’s a difficult task, particularly the provisioning processes
And even more to make it user friendly
The end user must be in the loop to detect suspicious activity
If it’s too complex, secure features won’t be used
A significant part of end users will install crappy apps, accept anything and not
care about security warnings
If the design of your solution includes access to contacts,
start a threat modeling session
Thank you !
Any question
contact@securingapps.com

Mais conteúdo relacionado

Destaque

Trabajo De Int A Los Sistemas
Trabajo De Int A Los SistemasTrabajo De Int A Los Sistemas
Trabajo De Int A Los Sistemasantonio777
 
Desinfectantes naty
Desinfectantes natyDesinfectantes naty
Desinfectantes natyRipley Perú
 
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)gemeindelingenau
 
Perspectivasmundiales 2011 Esp
Perspectivasmundiales 2011 EspPerspectivasmundiales 2011 Esp
Perspectivasmundiales 2011 Espbrokerinter
 
Drones voladores domiciliarios
Drones  voladores domiciliarios Drones  voladores domiciliarios
Drones voladores domiciliarios Dayana Rojas
 
Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Eventos Creativos
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Aaron Zauner
 
Northeast Wireless Safety Summit February 4, 2015 Presentations
Northeast Wireless Safety Summit February 4, 2015 PresentationsNortheast Wireless Safety Summit February 4, 2015 Presentations
Northeast Wireless Safety Summit February 4, 2015 PresentationsIlissa Miller
 
Balance de Materiales en Yacimientos de Petroleo con Gas Disuelto
Balance de Materiales en Yacimientos de Petroleo con Gas DisueltoBalance de Materiales en Yacimientos de Petroleo con Gas Disuelto
Balance de Materiales en Yacimientos de Petroleo con Gas DisueltoMagnusMG
 
Boletín de ambiente y seguridad industrial febrero
Boletín de ambiente y seguridad industrial   febreroBoletín de ambiente y seguridad industrial   febrero
Boletín de ambiente y seguridad industrial febreroCámaraCIP
 
POBRESA A L'ÀFRICA
POBRESA A L'ÀFRICAPOBRESA A L'ÀFRICA
POBRESA A L'ÀFRICAUna Arenita
 
Manejo de vias aereas altas
Manejo de vias aereas altasManejo de vias aereas altas
Manejo de vias aereas altasRafael Solano
 
Tipos de control
Tipos de controlTipos de control
Tipos de controlloreeleeii
 
La FilosofíA PolíTica
La FilosofíA PolíTicaLa FilosofíA PolíTica
La FilosofíA PolíTicaDenis Trillo
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterNEXTtour
 

Destaque (19)

Trabajo De Int A Los Sistemas
Trabajo De Int A Los SistemasTrabajo De Int A Los Sistemas
Trabajo De Int A Los Sistemas
 
Desinfectantes naty
Desinfectantes natyDesinfectantes naty
Desinfectantes naty
 
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)
Starke Kinder - der Weg der Mitte. (Sabine Erath-Stark)
 
CV Peens DC
CV Peens DCCV Peens DC
CV Peens DC
 
Perspectivasmundiales 2011 Esp
Perspectivasmundiales 2011 EspPerspectivasmundiales 2011 Esp
Perspectivasmundiales 2011 Esp
 
Insuficienciac[2]
Insuficienciac[2]Insuficienciac[2]
Insuficienciac[2]
 
Drones voladores domiciliarios
Drones  voladores domiciliarios Drones  voladores domiciliarios
Drones voladores domiciliarios
 
Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02Análisis forense de dispositivos android 02
Análisis forense de dispositivos android 02
 
Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)
 
Northeast Wireless Safety Summit February 4, 2015 Presentations
Northeast Wireless Safety Summit February 4, 2015 PresentationsNortheast Wireless Safety Summit February 4, 2015 Presentations
Northeast Wireless Safety Summit February 4, 2015 Presentations
 
Balance de Materiales en Yacimientos de Petroleo con Gas Disuelto
Balance de Materiales en Yacimientos de Petroleo con Gas DisueltoBalance de Materiales en Yacimientos de Petroleo con Gas Disuelto
Balance de Materiales en Yacimientos de Petroleo con Gas Disuelto
 
Boletín de ambiente y seguridad industrial febrero
Boletín de ambiente y seguridad industrial   febreroBoletín de ambiente y seguridad industrial   febrero
Boletín de ambiente y seguridad industrial febrero
 
POBRESA A L'ÀFRICA
POBRESA A L'ÀFRICAPOBRESA A L'ÀFRICA
POBRESA A L'ÀFRICA
 
2008 all ceramics at a glance
2008 all ceramics at a glance2008 all ceramics at a glance
2008 all ceramics at a glance
 
Manejo de vias aereas altas
Manejo de vias aereas altasManejo de vias aereas altas
Manejo de vias aereas altas
 
Tipos de control
Tipos de controlTipos de control
Tipos de control
 
La FilosofíA PolíTica
La FilosofíA PolíTicaLa FilosofíA PolíTica
La FilosofíA PolíTica
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking Datacenter
 
Memorias.- Teoría General del Proceso
Memorias.- Teoría General del ProcesoMemorias.- Teoría General del Proceso
Memorias.- Teoría General del Proceso
 

Semelhante a Introducing Man in the Contacts attack to trick encrypted messaging apps

SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxMarkAnthonyAurellano
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of NetiquetteRochelle Nato
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security offbeatnominee633
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook unsightlyoaf4043
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxHeideYlanan1
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyxdevsteam
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsJoel Cardella
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scamsMr.OoPpSs Group
 
Start your own video call network
Start your own video call networkStart your own video call network
Start your own video call networkRaavi A. Munaf
 

Semelhante a Introducing Man in the Contacts attack to trick encrypted messaging apps (20)

SH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptxSH003 Lesson 2_ Netiquette using the Internet.pptx
SH003 Lesson 2_ Netiquette using the Internet.pptx
 
Ways to protect your data from hacking
Ways to protect your data from hackingWays to protect your data from hacking
Ways to protect your data from hacking
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
Rules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptxRules of Nitiquette organize everything education computer.pptx
Rules of Nitiquette organize everything education computer.pptx
 
How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
 
WCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security studentsWCC 2012: General security introduction for non-security students
WCC 2012: General security introduction for non-security students
 
Chapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer Networks
 
Acne2
Acne2Acne2
Acne2
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
Start your own video call network
Start your own video call networkStart your own video call network
Start your own video call network
 

Mais de Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itCyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fCyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptCyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 

Mais de Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomwareCorporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScriptWarning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Operation emmental appsec
Operation emmental appsecOperation emmental appsec
Operation emmental appsec
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 

Último

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 

Último (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 

Introducing Man in the Contacts attack to trick encrypted messaging apps

  • 1. Introducing Man In The Contacts attack to trick encrypted messaging apps Cyber Securtiy Conference #CYBSEC16 03/11/2016 – Securing Apps
  • 2. whois securingapps Developer background Spent last 10 years working in Switzerland on security products and solutions Focus on mobile since 2010 Now software security consultant at my own company http://www.securingapps.com Provide services to build security in software Mobile Web Cloud Internet Of Things Bitcoin/Blockchain @SecuringApps
  • 3. Introduction Popular messaging apps recently switched to End-to-End encryption Great communication around it Privacy now is a requirement Debates at the government level to ask for backdoors Going dark ? Used by terrorists ? Increased feeling that those applications are unbreakable
  • 4. Super crypto. But wait …. Advanced ratcheting in Signal Protocol à Looks like an obvious flaw won’t be there But how messaging apps authenticate myself ? No explicit identifier Provisioning done via SMS Link to device/phone number And when I change phone number ? And my contacts ? Get them from my address book No manual contact handling (e.g. Skype)
  • 5. Threat model: mobile focus & simplified Other app Messaging app Mobile OS Contacts S t o r a g e N e t w o r k Messaging backend E2E encryption SMS init codeSMS init code messages messages backups
  • 6. Accessing contacts Easy to read/modify/create contacts There is an API for that Android example Shared data structure accessible in read/write Only restricted by permissions And it contains authentication data in clear ! There is room for a side channel attack: Man In The Contacts Not requiring a rooted device (e.g no RowHammer attack)
  • 7. Introducing Alice, Bob and Eve Convention: Alice on the left, Bob on the right, Eve in the center Devices not rooted, latest OS updates available Installed apps: latest version (29th October 2016) of WhatsApp, Telegram and Signal Android 5.0 Android 5.1iOs 10.1 Alice Eve Bob +33 X XX XX XX 60 +41 XX XXX XX 21 +41 XX XXX XX 66
  • 8. Old joke: swap contacts Install MITC app on Bob’s device Start a conversation between Alice and Bob Swap Alice and Eve phone numbers on Bob’s device See what happens Bob
  • 9. Old joke: swap contacts WhatsApp 1 Bob starts a conversion with Alice Alice answers Bob
  • 10. Old joke: swap contacts WhatsApp 2 Eve triggers contact swap via remote MITC app on Bob’s device Eve sends «This is eve» to Bob Notification received as Alice But new conversation Bob
  • 11. Old joke: swap contacts WhatsApp 3 Ignore notification Conversation of Alice now displayed as Eve Bob
  • 12. Old joke: swap contacts WhatsApp 4 Accept notification Eve triggered a new conversation But displayed as Alice Bob
  • 13. Old joke: swap contacts Telegram 1 Bob starts a conversion with Alice Alice answers Bob
  • 14. Old joke: swap contacts Telegram 2 Eve triggers contact swap via remote MITC app on Bob’s device Eve sends «This is Eve» to Bob Notification received as Alice But new conversation Bob
  • 15. Old joke: swap contacts Telegram 3 Accept notification Eve triggered a new conversation But displayed as Alice NB: If you change the name of Alice, in the future notifications and conversations will still be under the name of Alice Bob
  • 16. Old joke: swap contacts Signal 1 & 2 Screenshots refused by Android app But same behaviour than WhatsApp Bob
  • 17. Old joke: swap contacts Signal 3 Accept notification Eve triggered a new conversation Displayed as Alice But phone number also displayed (the iOs version doesn’t display it) Bob
  • 18. Old joke: swap contacts Signal 4 Not the case in the main view Bob
  • 19. Old joke: swap contacts Signal 5 Stay in this view Switch back contacts with MITC app Nothing happens for a while And then main view updated => contact sync process Bob
  • 20. Swap contacts results Can’t be used to trick Bob within an existing conversation But produces a notification and a new conversation that may seem legitimate to Bob Different behaviors depending on the app Name in the notification vs name in the conversation Name configured by the sender vs contact name as seen by receiver Contact sync time Not discrete in case Alice and Bob have a phone call or send a message
  • 21. Nasty trick: contact with similar name Start a conversation between Alice and Bob Create a contact name « Alice» on Bob’s device with Eve’s phone number See how the whitespace in front of Alice gets displayed Bob
  • 22. Nasty trick: contact with similar name WhatsApp 1 Alice starts a conversion with Bob Bob
  • 23. Nasty trick: contact with similar name WhatsApp 2 Eve starts a conversion with Bob Bob
  • 24. Nasty trick: contact with similar name WhatsApp 3 Main view Bob
  • 25. Nasty trick: contact with similar name WhatsApp 4 Conversation with real Alice Bob
  • 26. Nasty trick: contact with similar name WhatsApp 5 Conversation with Eve as « Alice» Bob
  • 27. Nasty trick: contact with similar name Telegram 1 Alice starts a conversion with Bob Bob
  • 28. Nasty trick: contact with similar name Telegram 2 Eve starts a conversion with Bob Bob
  • 29. Nasty trick: contact with similar name Telegram 3 Main view Bob
  • 30. Nasty trick: contact with similar name Telegram 4 Conversation with real Alice Bob
  • 31. Nasty trick: contact with similar name Telegram 5 Conversation with Eve as « Alice» Bob
  • 32. Nasty trick: contact with similar name Signal 1 Alice starts a conversion with Bob Bob
  • 33. Nasty trick: contact with similar name Signal 2 Eve starts a conversion with Bob Bob
  • 34. Nasty trick: contact with similar name Signal 4 Conversation with real Alice Bob
  • 35. Nasty trick: contact with similar name Signal 5 Conversation with Eve as « Alice» Bob
  • 36. Nasty trick: contact with similar name Signal 3 Main view Bob
  • 37. Contact with similar name results Creating « Alice» in addition to Alice is far more discrete Phone call/SMS OK with real contact Whitespace prefix is not visible in messaging apps Requires a new contact, but MITC app can delete/recreate « Alice» as often as needed Why does it work ? Design error from a security point of view: phone number poor identifier Abusing TOFU: new contact = new key = accepted by default End user/mobile not really included in threat model Focus on protecting network/backend (e.g. against government agencies) Side channel attack with some social engineering out of scope Yet after a few messages, Bob can guess it is not really Alice speaking to him
  • 38. Building an attack scenario with MITC Let’s build an easy exploitation scenario Convinced many more similar attacks are possible Look in detail in the implementations how contacts are handled Reverse engineering for WhatsApp/Telegram Highly likely Java readable code for handling the Android contacts Open source code for Signal Extra identifiers stored in contacts: they can also be modified ! Suppose Alice also installed the MITC app because it’s very popular or MITC app sends her a SMS recommending to do so because it found her in Bob’s contacts
  • 39. Man In The Middle: init phase 1. Have MITC deployed on the devices of Alice and Bob 2. Login as Eve to web version of messaging app 3. Create « Alice» and « Bob» with Eve’s phone number via MITC app BobAlice Eve
  • 40. Man In The Middle: provoke discussion 1 BobAlice Eve
  • 41. Man In The Middle: provoke discussion 2 BobAlice Eve
  • 42. Man In The Middle: discussion 1 BobAlice Eve
  • 43. Man In The Middle: discussion 2 BobAlice Eve
  • 44. Man In The Middle: discussion 3 BobAlice Eve
  • 45. Man In The Middle: discussion 4 BobAlice Eve
  • 46. Man In The Middle: discussion 5 BobAlice Eve
  • 47. Man In The Middle results WhatsApp Possible to share a real conversation between Bob and Alice via Eve Only need to switch to a new conversation by forcing a chat Later conversations will likely continue in this session (UI easiest path) Telegram: same results (web version also available), as long as the new contacts are used for the first time Signal: same results Phone number always displayed below contact name (Android version only)
  • 48. Risk assessment Simple evaluation: risk = easiness of attack * user impact Difficulty of attack: Low-Medium Technically: Low Easy to access contacts via code Not a problem to get MITC application approved for publication Logistics : Medium One phone number is enough Need to convince many users to install the MITC application But « Ponzi scheme » possible by using the contact information Impact: High Thousands of users can be spied: multi-app + multi-mobile os
  • 49. Vendors feedback 1/4 Telegram Very efficient Level 1 support (a contact in Telegram app) Level 2: security@telegram.org = /dev/null Contacted them 3 times Asked Level 1 to recontact them Public question via Twitter WhatsApp Contact Facebook security via form => automatic confirmation No answer for one month Recontacted them: answer received the next day Replied to it, but never got feedback
  • 50. Vendors feedback 2/4 WhatsApp answer (layout as is, bold added) We appreciate your report. Ultimately an attacker with malware installed on a device is going to be able to alter data on the device itself. In your examples for WhatsApp conversations remained properly bound to the phone number that the messages were sent to. Beyond that, WhatsApp allows people to set local aliases for contacts and to view the number associated with a specific message thread at any point. Given that, we don't feel that this behavior poses a significant risk and we do not plan to make any changes here. Please let us know if you feel we've misunderstood something here!
  • 51. Vendors feedback 3/4 Signal Not clear what is the channel for security issues Create report for Android app in Signal bug tracking tool Recontacted twice but no answer for 2 months Public question via Twitter Quick answer from support Someone from tech team will contact me soon After recontacting support, discussion started
  • 52. Vendors feedback 4/4 Signal 1st reply (layout as is, bold added) Hey Jeremy, saw your support email about "man in the contacts." This, like all interception techniques, is what safety numbers are for. Signal users would be notified that the safety numbers for their contact have changed, and be asked to verify them. A successful MITM attack would need to find a way to intercept communication without triggering that notice. Signal 2nd reply (layout as is, bold added) Hey Jeremy, Signal is not designed to protect your device against malware. Thanks for getting in touch, good luck with everything.
  • 53. Countermeasures: mobile apps Give up the implicit trust on contacts Deal with contacts the old way Provide an explicit identifier + authentifier Manually approve contacts to be added Or mitigate risk by increasing user awareness Clear message when a new conversation starts explaining to be cautious Ideally warning sign in the corresponding notification Display a visible trust level indicator next to the contact name If no chat history for this number/key, trust level set to minimum Phone number can help (if people know the numbers by heart …) Mobile OS: stronger restrictions for accessing contacts
  • 54. Countermeasures: end user Check your contacts Avoid installing applications asking for modify contacts permission Yes messagins apps ask for this permission … Use Threema Swiss German app Manual id handling Optional contact sync Visible trust level: Red/Orange/Green Questions on contacts handling sent to press@threema.ch Very detailed answer with the clear design choices received the next day
  • 55. Conclusion E2E can’t guarantee privacy if you’re not sure who you’re talking to Beware of messages displaying good cryptography is used because it can bring a false sense of security Security model around contacts is far too open for sensitive apps Authenticating the other party is an absolute necessity But it’s a difficult task, particularly the provisioning processes And even more to make it user friendly The end user must be in the loop to detect suspicious activity If it’s too complex, secure features won’t be used A significant part of end users will install crappy apps, accept anything and not care about security warnings If the design of your solution includes access to contacts, start a threat modeling session
  • 56. Thank you ! Any question contact@securingapps.com