A now-patched vulnerability in the Web version of Google Photos could let cybercriminals learn the details of a user's photo history, Imperva reports.
Through browser-based timing attacks, hackers could analyze image data to learn when a person visited a particular place. It's not a common threat, and it's most effective in a targeted scenario, but it was possible for someone to use a malicious website to access photo data.
Google Photos knows a lot about the people who use it. The service automatically tags each image using metadata (date, location coordinates), and its artificial intelligence engine can detect objects and events that would indicate a wedding, waterfall, sunset, or range of other locations, explains Imperva researcher Ron Masas. Facial recognition tags people also present in the photos.
Coupled with Google Photos' powerful search engine, this detailed information could share a lot about when, where, and with whom a person has been. All of this data can be used in search queries to unearth certain photos – for example: "Photos of me and Ashley from Paris 2018."
With this baseline time, Masas queried "photos of me from Iceland" and compared the two times. If this search took longer, he could infer the user had visited Iceland based on the data. If he added a date, he could know whether photos were taken in a specific time frame. For every place queried, a time longer than the baseline time indicates the user took photos there.
"The vulnerability is basically allowing different sites to search for you," Masas explains. As the malicious page is open, an attacker could repeatedly query Google Photos in the background. "By using the advanced search feature, I can ask a lot of questions about you," he adds.
However, once the victim closes the malicious page, the searches stop. "The moment you close the site, I no longer can do that," Masas says. "But I can trick you into opening another site in the future and can continue from there. It does require you to open a website each time."
In his opinion, this isn't a very complex attack but it does have the most value if a hacker is specifically targeting one individual. For example, someone could have used this to determine the location of a high-profile person or know who they have been spending time with. This type of attack "is very hard to detect if you're not looking for it actively," Masas adds. Could a similar vulnerability exist in other online services and applications? "Definitely," he notes. Many developers aren't aware of this problem, and it's important large and small sites learn of it.
This isn't the first time Masas has exposed an attack of this nature. Earlier this month, Facebook patched a flaw he had discovered in the Web version of Facebook Messenger, which could have let attackers view the people with whom someone had been chatting. Similarly, a victim would have to be tricked into opening a bad link; he'd also have to click somewhere on the page. When a new tab opened, the attacker could use the previous page to load the messenger chat endpoint and view which specific person or bots the target had been talking to.
- TLS 1.3: A Good News/Bad News Scenario
- Microsoft Office Dominates Most Exploited List
- 6 Ways Mature DevOps Teams Are Killing It in Security
- The Case of the Missing Data
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.