Menu
Security holes in Confide messaging app exposed user details

Security holes in Confide messaging app exposed user details

Despite its marketing, the app contained glaring problems with protecting user account information, according security researchers

Confide, a messaging app reportedly used by U.S. White House staff, apparently had several security holes that made it easier to hack.

Security consultancy IOActive found the vulnerabilities in Confide, which promotes itself as an app that offers “military-grade” end-to-end encryption.

But despite its marketing, the app contained glaring problems with securing user account information, IOActive said in a Wednesday post.

The consultancy noticed it could access records for 7,000 Confide users by exploiting vulnerabilities in the app’s account management system. Part of the problem resided with Confide’s API, which could be used to reveal data on user’s phone numbers and email addresses.

The vulnerabilities are especially problematic, given that Confide is designed to promote privacy. Republican officials and White House staff have reportedly adopted the app over its ability to send “self-destructing” messages that delete after being read.

However, the vulnerabilities found by IOActive suggest that the messaging app wasn’t using the best security practices.  

For instance, the app permitted users to choose easy-to-guess passwords. It also failed to stop “brute-force” attacks on user accounts, which can involve guessing user passwords through trial-and-error.  

Data sent from the app wasn’t always done securely, IOActive added. The software’s notification system neglected using a valid SSL (Secure Sockets Layers) server certificate to communicate over the internet. That could expose the app to a man-in-the-middle attack and allow hackers to eavesdrop on the internet traffic.

In addition, the app omitted using a system to authenticate encrypted messages, meaning that Confide itself could tamper any message sent in-transit.

Confide has already patched the problems. On Wednesday, the company said: “Not only have these issues been resolved, but we also have no detection of them being exploited by any other party.”

But it’s not the first time that Confide has faced concerns over the app’s security. Last month, journalists noticed that the Confide app allowed them to look up the phone numbers of White House staff, including press secretary Sean Spicer.

In an email, Confide said its security team is always monitoring its systems to protect users.

"As issues arise, we remain committed to addressing them quickly and efficiently, as we have done in this and every instance," it said. 


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments