quarta-feira, 26 de agosto de 2020

Insecurities Of WhatsApp's, Signal's, And Threema's Group Chats

Recently, the theoretical and practical analysis of secure instant messenger protocols received much attention, but the focus of prior evaluations mostly lay in one-to-one communication. In this blog post we want to presents the results of our work that focuses on group chat protocols of three major instant messenger applications; namely Signal, WhatsApp, and Threema.

In this blog post, we aim to focus on the practical impact and the found weaknesses identified by our analysis. The interested reader may also look into our paper for more details.


Our Aim and What We Were Looking For

End-to-end encryption protects the confidentiality of communication that is forwarded via central servers to the designated receivers. As a consequence, neither parties on the network route of the messages, nor the provider of the central server (e.g. the WhatsApp server) should be able to read any information out of the observation of the communication. In particular, no other user of the application should have access to the communication. Further it might be desirable to require that also the messages' integrity is end-to-end protected and that a sender is informed about the delivery state of sent messages.
Delivery state information in Signal (upper screenshot) and WhatsApp (lower screenshot)

In a two party scenario, this analysis is rather fixed to two components of the protocol: the key establishment between both parties and the communication channel protection using the established key (mostly consisting of an encryption algorithm and a scheme for providing integrity like MACs or signature schemes).

Regarded attackers


In a group setting, the same attackers apply (network, provider, other users). However the requirements for secure communication differ. It is further necessary that only group members can write to and read content from the group. Additionally, only administrators of the group are able to add new members.

In addition to these standard requirements, we also evaluated the protocols' security guarantees if the client's secrets were revealed (forward secrecy and future secrecy).

Our Approach

We analyzed the mentioned protocols by reading the source code and debugging the apps. We also used alternative open source implementations of Threema and WhatsApp as a help and we traced the network traffic. When using alternative implementations, we only took incoming traffic into account, which was generated by official applications. Thereby we extracted the protocol descriptions and evaluated them regarding the defined requirements.

Our Findings

In WhatsApp and Threema, the provider was able to manipulate the set of members. Threema only allowed the provider to rewind the set of members to a previous state. As a consequence previously removed members could have been added to the group again. The WhatsApp provider is able to arbitrarily manipulate the member set. Thereby further members and administrators can be added to the group. Since the authenticity of group manipulation is not protected, the WhatsApp provider can set the real group administrator as the source of manipulation even though this administrator was not active.

Since Signal's key exchange protocol provides future secrecy, we also evaluated the protocol's ability to recover into a secure group state after a member's state was compromised. The essential weakness here is that a sender only needs to know the static group ID to send a message to the group. If a group member receives a message with the correct group ID, no verification regarding the current member set takes place but the message is directly added to the group communication. Consequently it is sufficient to retrieve the group ID in order to send messages to the group. Since Signal treats content messages the same way as messages for the manipulation of the group set, an attacker who knows the group ID can add herself to the group and thereby read the subsequent group communication.

In addition to this, in all cases the delivery state of sent messages was not securely provided. Threema's group chats do not inform the sender about the delivery state while Signal and WhatsApp do not protect the delivery information on the end-to-end layer. Therefore the central provider can forge this information and drop messages without letting the communicating parties detect this.

Also the order of messages was manipulable for the providers of the applications such that the provider is able to deliver the messages in a different order than they were sent. Threema's weakness of rewinding a group state results from missing replay attack protection.

Impact of Weaknesses

Even though end-to-end encryption is implemented in all analyzed applications, the central providers can largely manipulate the communication in groups and partially also read it.
In all applications, the provider can undetectably drop and reorder messages during the delivery and thereby manipulate the view of the communication such that further attacks can be obfuscated.
The central servers of WhatsApp can be used to add arbitrary users to groups and thereby receive their communication.
To achieve the same result for Signal, it suffices to retrieve the group ID. An earlier member who left the group once still knows this ID since it is static. However, in contrast to WhatsApp, the origin of the manipulation is correctly displayed in the Signal application (which was not the fact when we started our analysis).

As a result, the end-to-end protection of WhatsApp is not sufficient to reach confidentiality in groups. For Signal no future secrecy is reached in groups and Threema was vulnerable to replay attacks which resulted in further weaknesses.

Responsible Disclosure

We disclosed our findings to the developers and received varying response. Threema updated their protocol in version 3.14 such that our attacks are not feasible anymore. Moxie Marlinspike responded that Signal is "working on an entirely new group mechanism that we should be deploying soon". WhatsApp did not hold out the prospect of fixing the described vulnerabilities (Update 01/18: According to Facebook's Security Head, the invite links make a fix more difficult [1]; we proposed a way to solve this issue [2]).

[1] https://twitter.com/alexstamos/status/951169036947107840
[2] https://web-in-security.blogspot.de/2018/01/group-instant-messaging-why-baming.html
Related news

  1. Hacking Tools Pc
  2. Nsa Hack Tools
  3. Pentest Tools
  4. Hacker Tools Apk Download
  5. Hacking Tools 2020
  6. Hacking Tools 2020
  7. Pentest Tools Tcp Port Scanner
  8. Pentest Tools Find Subdomains
  9. Hacking Tools For Pc
  10. Hacking Tools For Pc
  11. Install Pentest Tools Ubuntu
  12. Hack And Tools
  13. Hacker Tools 2019
  14. Pentest Tools Github
  15. Hack Tools For Ubuntu
  16. Github Hacking Tools
  17. Hacking Tools 2019
  18. Android Hack Tools Github
  19. Hack Tools Online
  20. Hack Tools Pc
  21. Pentest Tools Bluekeep
  22. Hacker Tools List
  23. Hacking Tools For Kali Linux
  24. Tools 4 Hack
  25. Tools Used For Hacking
  26. Hacker Tools Mac
  27. Hack Tools For Games
  28. Hacking App
  29. Hack Tool Apk No Root
  30. Kik Hack Tools
  31. Underground Hacker Sites
  32. Tools Used For Hacking
  33. Hack Tools Download
  34. Pentest Tools List
  35. Hacker Tools Github
  36. Usb Pentest Tools
  37. Pentest Tools Tcp Port Scanner
  38. Install Pentest Tools Ubuntu
  39. Pentest Tools Subdomain
  40. Hacking Tools Pc
  41. Hacker Tools Free Download
  42. Pentest Recon Tools
  43. Hacking Tools For Windows 7
  44. Pentest Tools Bluekeep
  45. Hacking Tools For Pc
  46. Physical Pentest Tools
  47. Hacker Tools List
  48. Hack Tools Pc
  49. Hack Tools
  50. Hacker
  51. Hacking Tools For Games
  52. Hacking Tools Pc
  53. Growth Hacker Tools
  54. Hacking Tools 2019
  55. Android Hack Tools Github
  56. Ethical Hacker Tools
  57. Tools 4 Hack
  58. Pentest Tools List
  59. Best Hacking Tools 2020
  60. Hacker Tools Apk Download
  61. Pentest Tools Find Subdomains
  62. Android Hack Tools Github
  63. Physical Pentest Tools
  64. Hack Tools For Mac
  65. Hacking Tools
  66. Hacker Tools 2020
  67. Best Hacking Tools 2019
  68. Hack Tools For Mac
  69. Pentest Reporting Tools
  70. What Is Hacking Tools
  71. Hacking Tools Online
  72. Hacks And Tools
  73. Game Hacking
  74. Pentest Tools Tcp Port Scanner
  75. Hacker Tools Free Download
  76. Pentest Tools Framework
  77. Physical Pentest Tools
  78. Pentest Tools Linux
  79. Hacking Tools For Windows Free Download
  80. Hack Tools Download
  81. Black Hat Hacker Tools
  82. Best Hacking Tools 2020
  83. Hack Tools For Windows
  84. How To Make Hacking Tools
  85. Hack Tools Pc
  86. Hacker Security Tools
  87. Computer Hacker
  88. Black Hat Hacker Tools
  89. Hacker Tools 2020
  90. Hack Tools For Mac
  91. Best Pentesting Tools 2018
  92. World No 1 Hacker Software
  93. Hacking Tools Mac
  94. Hack Tools 2019
  95. Pentest Tools Bluekeep
  96. Hacking Tools Windows 10
  97. Hacker Search Tools
  98. Hack Tools 2019
  99. Hacking Tools Mac
  100. Black Hat Hacker Tools
  101. Pentest Tools Linux
  102. Easy Hack Tools
  103. Hacking Tools For Mac
  104. Tools 4 Hack
  105. New Hack Tools
  106. Computer Hacker
  107. Pentest Tools Download
  108. Hacking Tools For Pc
  109. Hacker Security Tools
  110. How To Make Hacking Tools
  111. Hack Apps
  112. Best Pentesting Tools 2018
  113. Pentest Tools Android
  114. Pentest Tools For Ubuntu
  115. Tools Used For Hacking
  116. Hacker Tools Online
  117. Pentest Recon Tools
  118. Hacker Tools Online
  119. Easy Hack Tools
  120. Pentest Tools Website Vulnerability
  121. Hacking Tools For Mac
  122. Hack Tool Apk No Root
  123. Top Pentest Tools
  124. Hacking Tools Hardware
  125. Hack Tools For Ubuntu
  126. Usb Pentest Tools
  127. Hacking Tools Github
  128. Pentest Tools Kali Linux
  129. Growth Hacker Tools
  130. Hack Tools Download
  131. What Is Hacking Tools
  132. Hack Tools For Ubuntu
  133. Kik Hack Tools
  134. Pentest Tools List
  135. Hacking Tools Free Download
  136. Android Hack Tools Github
  137. Pentest Box Tools Download
  138. Hack Website Online Tool
  139. What Are Hacking Tools
  140. How To Make Hacking Tools
  141. Hacking App
  142. Physical Pentest Tools
  143. Pentest Tools Alternative
  144. Pentest Tools Online
  145. Termux Hacking Tools 2019
  146. How To Install Pentest Tools In Ubuntu
  147. Nsa Hack Tools
  148. Hack Tools Mac
  149. Hacker Tools Hardware
  150. How To Install Pentest Tools In Ubuntu
  151. Pentest Reporting Tools
  152. Hacking Tools For Games
  153. Wifi Hacker Tools For Windows
  154. Hacker Tools For Mac
  155. Computer Hacker
  156. Kik Hack Tools
  157. Hacker Tools Linux
  158. Hacker Tools Hardware
  159. Hacking Tools For Pc
  160. Pentest Tools Port Scanner
  161. Pentest Tools For Android
  162. Hacking Tools Online
  163. Pentest Tools For Mac
  164. Hacker Tools 2020
  165. Pentest Tools For Android
  166. Hacking Tools Software
  167. Hack Tools For Ubuntu
  168. Hacker Tools Free
  169. Pentest Tools For Android
  170. Hacker Tools 2019
  171. Hack Apps
  172. Pentest Tools Review
  173. Hack Tools Pc
  174. Best Pentesting Tools 2018
  175. Pentest Tools For Windows

Nenhum comentário: