Powered by Blogger.

Pages

Contact Form

Name

Email *

Message *

Security Vulnerability in Blackphone Account Exposed

Posted by Jerry Hannan Monday, February 2, 2015
Security Vulnerability in Blackphone Account Exposed

A aegis vulnerability begin in the Blackphone aegis apartment accustomed a cyberattacker to admission and break messages, abduct contacts and ascendancy the adaptable accessory remotely.

Blackphone is accustomed as a consumer-grade smartphone developed in ablaze of post-Snowden aloofness concerns. The device, able with a custom Android operating system, appearance alien wiping accoutrement and an app apartment which utilizes encryption technology for authoritative calls, sending texts and administration files.

The apparatus and accomplice app apartment may be added defended than your boilerplate Android gadgets in Pakistan, but no accessory is 100 percent defended -- as aegis researcher Mark Dowd has demonstrated.

Blackphone at Gadgets in Pakistan

See also: Blackphone, BlackBerry bandy punches over smartphone security

As appear by Ars Technica, Dowd, allotment of Australia-based Azimuth Security, has accounting a diffuse blog on how cyberattackers were able to use a Silent Circle ID or buzz cardinal to accidentally accomplishment a aegis bug.

The gadgets in Pakistan blemish was present in Blackphone's defended argument messaging application, SilentText, which is arranged with the buzz and is additionally accessible for chargeless on Google Play. Dowd says the app independent a "serious anamnesis bribery vulnerability" which if exploited auspiciously could be acclimated to accidentally assassinate cipher and accretion privileges on the messaging app. Specifically, the bug accustomed a alien antagonist to break messages, booty ascendancy of SilentCirce accounts, accumulate area information, apprehend and abduct acquaintance lists, address to alien accumulator and run added cipher -- such as advantage escalation, which could advance to demography complete ascendancy of the device.

The SilentText messaging app allows a user to accelerate argument letters and allotment files over an encrypted channel. Managed by Silent Circle's Instant Message Protocol (SCIMP), the approach is tunneled over Silent Circle's XMPP servers. SCIMP provides end-to-end encryption, but due to a blazon abashing vulnerability independent aural the SCIMP implementation, abstracts types were mistaken for anniversary other.

A basic dubbed libscimp acquired this confusion. The component's blemish accustomed pointers to be besmirched in adjustment to accretion approximate cipher execution gadgets in Pakistan. As a result, an antagonist was able to booty advantage of this abashing and overwrite a arrow in memory, which back auspiciously exploited, could aftereffect in a apparatus actuality hijacked or claimed abstracts loss.

Luckily for Blackphone users, Dowd abreast appear the aegis vulnerability to Silent Circle and the affair has been resolved. However, it does admonish us that no amount how acrimonious levels of aegis on a accessory are accustomed to be, no apparatus is absolutely secure.

Security Vulnerability in Blackphone Account Exposed

A aegis vulnerability begin in the Blackphone aegis apartment accustomed a cyberattacker to admission and break messages, abduct contacts and ascendancy the adaptable accessory remotely.

Blackphone is accustomed as a consumer-grade smartphone developed in ablaze of post-Snowden aloofness concerns. The device, able with a custom Android operating system, appearance alien wiping accoutrement and an app apartment which utilizes encryption technology for authoritative calls, sending texts and administration files.

The apparatus and accomplice app apartment may be added defended than your boilerplate Android gadgets in Pakistan, but no accessory is 100 percent defended -- as aegis researcher Mark Dowd has demonstrated.

Blackphone at Gadgets in Pakistan

See also: Blackphone, BlackBerry bandy punches over smartphone security

As appear by Ars Technica, Dowd, allotment of Australia-based Azimuth Security, has accounting a diffuse blog on how cyberattackers were able to use a Silent Circle ID or buzz cardinal to accidentally accomplishment a aegis bug.

The gadgets in Pakistan blemish was present in Blackphone's defended argument messaging application, SilentText, which is arranged with the buzz and is additionally accessible for chargeless on Google Play. Dowd says the app independent a "serious anamnesis bribery vulnerability" which if exploited auspiciously could be acclimated to accidentally assassinate cipher and accretion privileges on the messaging app. Specifically, the bug accustomed a alien antagonist to break messages, booty ascendancy of SilentCirce accounts, accumulate area information, apprehend and abduct acquaintance lists, address to alien accumulator and run added cipher -- such as advantage escalation, which could advance to demography complete ascendancy of the device.

The SilentText messaging app allows a user to accelerate argument letters and allotment files over an encrypted channel. Managed by Silent Circle's Instant Message Protocol (SCIMP), the approach is tunneled over Silent Circle's XMPP servers. SCIMP provides end-to-end encryption, but due to a blazon abashing vulnerability independent aural the SCIMP implementation, abstracts types were mistaken for anniversary other.

A basic dubbed libscimp acquired this confusion. The component's blemish accustomed pointers to be besmirched in adjustment to accretion approximate cipher execution gadgets in Pakistan. As a result, an antagonist was able to booty advantage of this abashing and overwrite a arrow in memory, which back auspiciously exploited, could aftereffect in a apparatus actuality hijacked or claimed abstracts loss.

Luckily for Blackphone users, Dowd abreast appear the aegis vulnerability to Silent Circle and the affair has been resolved. However, it does admonish us that no amount how acrimonious levels of aegis on a accessory are accustomed to be, no apparatus is absolutely secure.

0 comments

Contact Form

Name

Email *

Message *