Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:08 PM
Connect Directly

Researchers Find Multiple Critical Flaws In Confide Secure Messaging App

All flaws have been fixed, says maker of app purportedly used for secret communications by political operatives in DC.

Confide, a messaging app that has seen big growth recently following reports of its popularity for sharing confidential information among Trump aides, may in fact have not been as secure as many of its users may have imagined.

Recent tests conducted by security vendor IOActive turned up multiple critical vulnerabilities in the application, including some which allowed encrypted messages to be intercepted and altered.

All of the vulnerabilities have been fixed after IOActive reported them to Confide. But the discovery of the bugs in an app touted as offering secure, confidential messaging is another reminder of why there is no such thing as bulletproof security on the Internet.

In an emailed statement to Dark Reading, Confide president Jon Brod acknowledged the issues and said they had been addressed. “As a confidential messenger, privacy and security is at the heart of everything we do,” Brod said.

“Our security team is continuously monitoring our systems to protect our users' integrity, and we were able to detect anomalous behavior and remediate many of the issues during IOActive's testing in real time.”

Brod said there is no indication that the flaws, which IOActive had discovered, were exploited.

Confide is best known for being an app that allows users to send encrypted messages that self-destruct after they are read once. The app touts military grade end-to-end encryption and security features like one that prevents screenshots of messages from being taken.

In an interview with CNBC in February, Brod claimed the app’s user base had grown sevenfold in one week after reports surfaced about political operatives in Washington D.C. using it to share information confidentially. One of the reports was from the Washington Post, which claimed that White House staffers, fearful of being identified as speaking with the media, had resorted to using the app to communicate secretly.

IOActive security researchers found the vulnerabilities in Confide version 1.4.2 for Windows and OS X, and version 4.0.4 for Android by reverse engineering the software and observing its behavior and interactions with the public API.

The exercise revealed problems with Confide’s notification, messaging, and account management systems and also with the application’s website as well.

The vulnerabilities gave attackers an opportunity to hijack account sessions or to guess passwords so they could impersonate other users. The flaws also let attackers acquire the contact details of specific Confide users, or all of them, or to launch man-in-the-middle attacks for intercepting and decrypting messages or for altering them without decrypting.

In a security advisory, IOActive said at the time of its testing, Confide’s notification system did not require a valid SSL server certificate, thereby giving attackers opportunity to grab session information via a man-in-the-middle attack.

Another vulnerability, exploited by an attacker using the Confide API directly, would have caused unencrypted messages to be transmitted with message recipients having no indication they had received an unencrypted message, says Ryan O'Horo, a security researcher at IOActive.

In addition, the Confide API would return metadata for certain functions such as "lookup" in order to populate fields in the client user interface, O’Horo says.

“The ‘block’ function, for example, would allow you to block a user based on an incrementing database record number and a sibling function ‘blocked’ would return metadata for users previously specified with ‘block,’” he says.

The Confide application, as tested, gave attackers a way to pull Confide user accounts, including real names, e-mail addresses, and phone numbers, according to IOActive. It allowed user account passwords to be guessed via brute-force methods and did not require users to choose complex passwords.

In all, the IOActive researchers were able to pull some 7,000 records for users who had registered for the app during a two-day period in February. The records suggested that between 800,000 and 1 million user records were stored in the app’s database.

“Although the app had security vulnerabilities when we tested it, this was a good example of a research team and vendor working collaboratively through a successful responsible vulnerability disclosure process,” O’Horo says.

Related stories:


Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
3/9/2017 | 6:02:38 PM
This should lock down the Confide app
Don't know if this true but appvision.net says they lock the mobile app binaries of an already functioning mobile app. If true this would be a good security solution for mobile VOiP apps.
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-19
In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
PUBLISHED: 2019-08-19
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_get_hba_info does not initialize the hbainfo structure.
PUBLISHED: 2019-08-19
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
PUBLISHED: 2019-08-19
An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.
PUBLISHED: 2019-08-19
An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.