Vulnerabilities / Threats

04:08 PM
Connect Directly

Researchers Find Multiple Critical Flaws In Confide Secure Messaging App

All flaws have been fixed, says maker of app purportedly used for secret communications by political operatives in DC.

Confide, a messaging app that has seen big growth recently following reports of its popularity for sharing confidential information among Trump aides, may in fact have not been as secure as many of its users may have imagined.

Recent tests conducted by security vendor IOActive turned up multiple critical vulnerabilities in the application, including some which allowed encrypted messages to be intercepted and altered.

All of the vulnerabilities have been fixed after IOActive reported them to Confide. But the discovery of the bugs in an app touted as offering secure, confidential messaging is another reminder of why there is no such thing as bulletproof security on the Internet.

In an emailed statement to Dark Reading, Confide president Jon Brod acknowledged the issues and said they had been addressed. “As a confidential messenger, privacy and security is at the heart of everything we do,” Brod said.

“Our security team is continuously monitoring our systems to protect our users' integrity, and we were able to detect anomalous behavior and remediate many of the issues during IOActive's testing in real time.”

Brod said there is no indication that the flaws, which IOActive had discovered, were exploited.

Confide is best known for being an app that allows users to send encrypted messages that self-destruct after they are read once. The app touts military grade end-to-end encryption and security features like one that prevents screenshots of messages from being taken.

In an interview with CNBC in February, Brod claimed the app’s user base had grown sevenfold in one week after reports surfaced about political operatives in Washington D.C. using it to share information confidentially. One of the reports was from the Washington Post, which claimed that White House staffers, fearful of being identified as speaking with the media, had resorted to using the app to communicate secretly.

IOActive security researchers found the vulnerabilities in Confide version 1.4.2 for Windows and OS X, and version 4.0.4 for Android by reverse engineering the software and observing its behavior and interactions with the public API.

The exercise revealed problems with Confide’s notification, messaging, and account management systems and also with the application’s website as well.

The vulnerabilities gave attackers an opportunity to hijack account sessions or to guess passwords so they could impersonate other users. The flaws also let attackers acquire the contact details of specific Confide users, or all of them, or to launch man-in-the-middle attacks for intercepting and decrypting messages or for altering them without decrypting.

In a security advisory, IOActive said at the time of its testing, Confide’s notification system did not require a valid SSL server certificate, thereby giving attackers opportunity to grab session information via a man-in-the-middle attack.

Another vulnerability, exploited by an attacker using the Confide API directly, would have caused unencrypted messages to be transmitted with message recipients having no indication they had received an unencrypted message, says Ryan O'Horo, a security researcher at IOActive.

In addition, the Confide API would return metadata for certain functions such as "lookup" in order to populate fields in the client user interface, O’Horo says.

“The ‘block’ function, for example, would allow you to block a user based on an incrementing database record number and a sibling function ‘blocked’ would return metadata for users previously specified with ‘block,’” he says.

The Confide application, as tested, gave attackers a way to pull Confide user accounts, including real names, e-mail addresses, and phone numbers, according to IOActive. It allowed user account passwords to be guessed via brute-force methods and did not require users to choose complex passwords.

In all, the IOActive researchers were able to pull some 7,000 records for users who had registered for the app during a two-day period in February. The records suggested that between 800,000 and 1 million user records were stored in the app’s database.

“Although the app had security vulnerabilities when we tested it, this was a good example of a research team and vendor working collaboratively through a successful responsible vulnerability disclosure process,” O’Horo says.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/9/2017 | 6:02:38 PM
This should lock down the Confide app
Don't know if this true but says they lock the mobile app binaries of an already functioning mobile app. If true this would be a good security solution for mobile VOiP apps.
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.
PUBLISHED: 2018-09-20
LINK-NET LW-N605R devices with firmware allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.