Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App

0
252

[ad_1]

Jan 10, 2023Ravie LakshmananPrivacy / Encryption

Threema Messaging App

A complete evaluation of the cryptographic protocols used within the Swiss encrypted messaging software Threema has revealed plenty of loopholes that might be exploited to interrupt authentication protections and even recuperate customers’ personal keys.

The seven assaults span three completely different menace fashions, in accordance to ETH Zurich researchers Kenneth G. Paterson, Matteo Scarlata, and Kien Tuong Truong, who reported the problems to Threema on October 3, 2022. The weaknesses have since been addressed as a part of updates launched by the corporate on November 29, 2022.

Threema is an encrypted messaging app that is utilized by greater than 11 million customers as of October 2022. “Security and privateness are deeply ingrained in Threema’s DNA,” the corporate claims on its web site.

Officially utilized by the Swiss Government and the Swiss Army, it is also marketed as a safe various alongside different providers resembling Signal, Meta-owned WhatsApp, and Telegram.

While Threema has been subjected to third-party code audits at the least twice – as soon as in 2019 and a second time in 2020 – the newest findings present that they weren’t thorough sufficient to uncover the issues current within the “cryptographic core of the appliance.”

“Ideally, any software utilizing novel cryptographic protocols ought to include its personal formal safety analyses (within the type of safety proofs) in an effort to present sturdy safety assurances,” the researchers mentioned.

In a nutshell, the assaults may pave the way in which for a variety of exploitation situations, specifically permitting an attacker to impersonate a consumer, reorder the sequence of messages exchanged between two events, clone the account of a sufferer person, and even leverage the backup mechanism to recuperate the person’s personal key.

The latter two assault pathways, which require direct entry to a sufferer’s gadget, may have extreme penalties, because it permits the adversary to stealthily entry the customers’ future messages with out their information.

Also uncovered is a case of replay and reflection assault associated to its Android app that happens when customers reinstall the app or change units, granting a nasty actor with entry to Threema servers to replay previous messages. A comparable replay assault was recognized in January 2018.

Last however not least, an adversary may additionally stage what’s known as a Kompromat assault whereby a malicious server tips a consumer “into unwittingly encrypting a message of the server’s selecting that may be delivered to a distinct person.”

It’s value noting that this assault was beforehand reported to Threema by University of Erlangen-Nuremberg researcher Jonathan Krebs, prompting the corporate to ship fixes in December 2021 (model 4.62 for Android and model 4.6.14 for iOS).

“Using trendy, safe libraries for cryptographic primitives doesn’t, by itself, result in a safe protocol design,” the researchers mentioned. “Libraries resembling NaCl or libsignal could be misused whereas constructing extra advanced protocols and builders have to be cautious to not be lulled right into a false sense of safety.”

“While the mantra ‘do not roll your individual crypto’ is now broadly identified, it needs to be prolonged to ‘do not roll your individual cryptographic protocol’ (assuming one already exists that meets the developer’s necessities),” they added. “In the case of Threema, the bespoke C2S protocol might be changed by TLS.”

When reached for remark, Threema informed The Hacker News that it has launched a brand new communication protocol known as Ibex that renders “a number of the points out of date,” including it “acted immediately to implement fixes for all findings inside weeks.”

“While a number of the findings […] could also be attention-grabbing from a theoretical standpoint, none of them ever had any appreciable real-world impression,” the corporate additional famous. “Most assume intensive and unrealistic conditions that will have far better penalties than the respective discovering itself.”

It additionally identified that a number of the assaults financial institution on having bodily entry to an unlocked cellular gadget over an prolonged time interval, at which level the “whole gadget have to be thought-about compromised.”

The examine arrives nearly six months after ETH Zurich researchers detailed vital shortcomings within the MEGA cloud storage service that might be weaponized to crack the personal keys and absolutely compromise the privateness of the uploaded recordsdata.

Then in September 2022, one other group of researchers disclosed a bunch of safety flaws within the Matrix decentralized, real-time communication protocol that grant a malicious server operator the flexibility to learn messages and impersonate customers, successfully undermining the confidentiality and authenticity of the service.

Found this text attention-grabbing? Follow us on Twitter and LinkedIn to learn extra unique content material we publish.

LEAVE A REPLY

Please enter your comment!
Please enter your name here