Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:08 PM
Connect Directly

Researchers Find Multiple Critical Flaws In Confide Secure Messaging App

All flaws have been fixed, says maker of app purportedly used for secret communications by political operatives in DC.

Confide, a messaging app that has seen big growth recently following reports of its popularity for sharing confidential information among Trump aides, may in fact have not been as secure as many of its users may have imagined.

Recent tests conducted by security vendor IOActive turned up multiple critical vulnerabilities in the application, including some which allowed encrypted messages to be intercepted and altered.

All of the vulnerabilities have been fixed after IOActive reported them to Confide. But the discovery of the bugs in an app touted as offering secure, confidential messaging is another reminder of why there is no such thing as bulletproof security on the Internet.

In an emailed statement to Dark Reading, Confide president Jon Brod acknowledged the issues and said they had been addressed. “As a confidential messenger, privacy and security is at the heart of everything we do,” Brod said.

“Our security team is continuously monitoring our systems to protect our users' integrity, and we were able to detect anomalous behavior and remediate many of the issues during IOActive's testing in real time.”

Brod said there is no indication that the flaws, which IOActive had discovered, were exploited.

Confide is best known for being an app that allows users to send encrypted messages that self-destruct after they are read once. The app touts military grade end-to-end encryption and security features like one that prevents screenshots of messages from being taken.

In an interview with CNBC in February, Brod claimed the app’s user base had grown sevenfold in one week after reports surfaced about political operatives in Washington D.C. using it to share information confidentially. One of the reports was from the Washington Post, which claimed that White House staffers, fearful of being identified as speaking with the media, had resorted to using the app to communicate secretly.

IOActive security researchers found the vulnerabilities in Confide version 1.4.2 for Windows and OS X, and version 4.0.4 for Android by reverse engineering the software and observing its behavior and interactions with the public API.

The exercise revealed problems with Confide’s notification, messaging, and account management systems and also with the application’s website as well.

The vulnerabilities gave attackers an opportunity to hijack account sessions or to guess passwords so they could impersonate other users. The flaws also let attackers acquire the contact details of specific Confide users, or all of them, or to launch man-in-the-middle attacks for intercepting and decrypting messages or for altering them without decrypting.

In a security advisory, IOActive said at the time of its testing, Confide’s notification system did not require a valid SSL server certificate, thereby giving attackers opportunity to grab session information via a man-in-the-middle attack.

Another vulnerability, exploited by an attacker using the Confide API directly, would have caused unencrypted messages to be transmitted with message recipients having no indication they had received an unencrypted message, says Ryan O'Horo, a security researcher at IOActive.

In addition, the Confide API would return metadata for certain functions such as "lookup" in order to populate fields in the client user interface, O’Horo says.

“The ‘block’ function, for example, would allow you to block a user based on an incrementing database record number and a sibling function ‘blocked’ would return metadata for users previously specified with ‘block,’” he says.

The Confide application, as tested, gave attackers a way to pull Confide user accounts, including real names, e-mail addresses, and phone numbers, according to IOActive. It allowed user account passwords to be guessed via brute-force methods and did not require users to choose complex passwords.

In all, the IOActive researchers were able to pull some 7,000 records for users who had registered for the app during a two-day period in February. The records suggested that between 800,000 and 1 million user records were stored in the app’s database.

“Although the app had security vulnerabilities when we tested it, this was a good example of a research team and vendor working collaboratively through a successful responsible vulnerability disclosure process,” O’Horo says.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/9/2017 | 6:02:38 PM
This should lock down the Confide app
Don't know if this true but appvision.net says they lock the mobile app binaries of an already functioning mobile app. If true this would be a good security solution for mobile VOiP apps.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Out-of-Date and Unsupported Cloud Workloads Continue as a Common Weakness
Robert Lemos, Contributing Writer,  7/28/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
PUBLISHED: 2020-08-03
IBM Cognos Analytics 11.0 and 11.1 is vulnerable to privlege escalation where the "My schedules and subscriptions" page is visible and accessible to a less privileged user. IBM X-Force ID: 167449.
PUBLISHED: 2020-08-03
IBM Financial Transaction Manager 3.2.4 is vulnerable to SQL injection. A remote attacker could send specially-crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 177839.
PUBLISHED: 2020-08-03
IBM Cognos Anaytics 11.0 and 11.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 179156.
PUBLISHED: 2020-08-03
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper handling of UNC paths. By scheduling a task with a specially-crafted UNC path, an attacker could exploit this vulnerability to execute arbi...