» » Threema Under Fire After Downplaying Security Research

Threema Under Fire After Downplaying Security Research

Threema Under Fire After Downplaying Security Research

Residence › Vulnerabilities

Threema Beneath Fireplace After Downplaying Safety Analysis

By Eduard Kovacs on January 12, 2023

Tweet

The builders of the open supply safe messaging app Threema have come underneath fireplace over their public response to a safety evaluation carried out by researchers on the Swiss college ETH Zurich.

The Swiss firm that makes Threema claims to have greater than 10 million customers and over 7,000 on-premises prospects. Prospects reportedly embrace the Swiss authorities and German chancellor Olaf Scholz.

ETH Zurich researchers analyzed the appliance and its communication protocol final yr and found seven varieties of assaults that could possibly be launched by an attacker who can intercept communications, one who has compromised a server, or one who has hacked the focused consumer’s machine.

In response to the researchers, they discovered points associated to authentication and encryption that might enable an attacker to acquire message metadata (not precise conversations), stop messages from being delivered, clone accounts, get well the personal key related to a consumer’s Threema ID, and encrypt probably compromising messages and ship them to a consumer in an effort to plant proof.

The researchers printed a paper detailing their findings and arrange a devoted web site for his or her safety evaluation of Threema.

The findings had been reported to Threema builders in October 2022 and the corporate has since launched mitigations, in addition to a brand new protocol, to mitigate the assault strategies.

In an announcement printed on its web site the day the researchers made their findings public, Threema thanked them, however famous that not one of the assault strategies they described “ever had any appreciable real-world affect”.

The corporate identified that the assaults should not straightforward to drag off, requiring prolonged bodily entry to an unlocked machine, in depth social engineering, or appreciable computing sources.

“Most [attacks] assume in depth and unrealistic conditions that will have far better penalties than the respective discovering itself,” Threema mentioned in a weblog submit.

The assertion downplays the findings, however that’s not unusual for distributors. Nevertheless, a message posted by Threema on Twitter led to the corporate being vastly criticized by the cybersecurity neighborhood.

“There’s a brand new paper on Threema’s outdated communication protocol. Apparently, right now’s academia forces researchers and even college students to hopelessly oversell their findings,” the corporate wrote in a message pointing to its official assertion.

The corporate’s weblog submit on the matter was initially titled “New Paper on Previous Threema Protocol”, however was later renamed to “Assertion on ETH Findings”.

Kenneth Paterson, an ETH Zurich professor concerned within the analysis, described the tweet as “unexpectedly dismissive”, claiming that the Threema protocol was up to date because of their work.

Threema, alternatively, denies this and claims that the introduction of the brand new protocol “was deliberate for a while and coincided with the disclosure interval of the researchers”.

Members of the cybersecurity neighborhood described the corporate’s response as aggressive, unprofessional, and smug. It appears that evidently the vulnerabilities gained extra consideration as a result of Threema’s poor response relatively than the precise severity of the issues.

Associated: Google Rolls out E2EE For Android Messages App

Associated: Encrypted Companies Suppliers Involved About EU Proposal for Encryption Backdoors

Associated: Swiss Military Knifes WhatsApp at Work

Get the Each day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Tesla Returns as Pwn2Own Hacker Takeover Goal
  • Twitter Finds No Proof of Vulnerability Exploitation in Latest Knowledge Leaks
  • Cisco Warns of Important Vulnerability in EoL Small Enterprise Routers
  • The Guardian Confirms Private Info Compromised in Ransomware Assault
  • Threema Beneath Fireplace After Downplaying Safety Analysis
  • Subtle ‘Darkish Pink’ APT Targets Authorities, Army Organizations
  • Not too long ago Disclosed Vulnerability Exploited to Hack Lots of of SugarCRM Servers
  • Extreme Vulnerabilities Permit Hacking of Asus Gaming Router
  • Cyber Incident Hits UK Postal Service, Halts Abroad Mail
  • Pink Hat Pronounces Basic Availability of Malware Detection Service

Searching for Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

The way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

SecurityWeek Podcast

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles