• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      Security and Privacy Risks of Instant Messengers

      • Posted by DavidBalaban
      • Date May 8, 2021

      Attackers constantly leverage various security and privacy issues to breach popular messengers. Can these apps be trusted?

      Calling instant messengers top applications is like saying that the most popular liquid is water. The list of most downloaded apps includes Facebook Messenger, Telegram, and Whatsapp.

      WhatsApp and beyond

      A massive reputational blow opened this year for WhatsApp further compromising the security image of instant messengers. However, the information security of instant messengers was under the scrutiny of experts and journalists long before that due to their popularity.

      In January, WhatsApp announced a privacy policy update. WhatsApp announced that it would transfer user data to Facebook. Its audience responded immediately by migrating to the competitors which increased their downloads in times. For example, Signal messenger downloads grew by 4200% in a week following the announcement.

      It is important to note that actually these changes to the privacy policy do not affect the existing methods or actions of WhatsApp in relation to the exchange of data with Facebook. It is just that they get legally declared. Nothing changes for the end-users, and their dramatic outflow is but a delayed response to the Cambridge Analytica scandal that makes people doubt whether Facebook maintains a sound privacy policy.

      WhatsApp and Viber had been repeatedly criticized for security problems before January’s statement. For example, in February 2020, the hackers were found to be capable of  accessing users’ personal data by sending a single text message to the victim. 

      A bit later, the researchers revealed that WhatsApp, Signal, and Telegram were leaking phone numbers of their users. And in the case of Telegram, even the users holding no account were exposed to the leakage as all contacts of any account holder were disclosed thus enabling the malefactors to use that data for creating fake accounts and launching various attacks.

      In June 2020, the news broke that WhatsApp phone numbers had been publicly available for a long time. Dark web resources or other sophistications were unnecessary; you could do a quite simple Google search and find them. 

      The vulnerability was discovered by Athul Jayaram, a cybersecurity researcher. He claimed that using Google he managed to get the numbers of about 300,000 users of the messenger. WhatsApp could have avoided this issue if it had encrypted the users’ contact details instead of plain text storing.

      Meanwhile, all the three messengers – WhatsApp, Signal, and Telegram are ranked among the top five most protected according to the report by AVG, an antivirus software developer. In their turn, the authors of the study Obstacles to the Adoption of Secure Communication Tools wrote that the vast majority of users do not understand the basic concept of end-to-end encryption.

      People used to choose a messenger listening to their heart, not to their brain, but the events in January suggest the opposite trend is on the rise. Users stop focusing on the nice interface and overall popularity of the app and start to pay attention to the security of their data.

      Encryption

      A messenger to be secured requires any content sent between users to be encrypted and decrypted without involving a third party, i.e., directly on the user’s device. Most applications use the open-source Signal protocol or its variants. 

      Telegram runs its own closed protocol. However, these protocols provide encryption during data transmission only and do not apply encryption during data processing or after data is received by the end-user. Other functions, such as data storage, user interface framework, and group chat routines, are also vulnerable.

      In addition, in the case of Telegram, an attacker can send a recovery code to his phone number, gaining access to your account unless you use two-factor authentication. This enables the malefactors to access the entire history of user communication (except for the history of secret chats.)

      In view of all these and other vulnerabilities, end-to-end encryption is by no means a panacea. True, the service operators are unable to view your messages directly. Indirect options are always available though.

      Talking about desktop versions, even the most advanced messengers such as Signal and Telegram (which have made privacy and security their priority) are vulnerable. Telegram’s desktop version is vulnerable to session hijacking. Although the additional session will be visible, an average user is unlikely to notice it. 

      Another problem is that if you wish, you can copy the folder and transfer all unencrypted data and messages to another device. You do not need to be a hacker or have any advanced skills to do this.

      It is important to know whether the open-source code is available on the web for viewing and exploring. Of course, a user without advanced skills is unlikely to manage reading it or making sure no vulnerabilities and tracking are taking place, but public availability of the code is a good sign that the developer is willing to be as open as possible with you.

      Signal and Telegram have announced open access to their code, but as for the latter, you will not find Telegram’s server-side code available for compiling and using in the intranet, that is, for your internal network. As to the open part of the Telegram code, it gets updated too often, and the code that you can find online is almost always outdated.

      An important aspect of security is the inability to identify users. As long as signing up and signing in does not require you to enter your personal details (name, email, phone number), your identity is not likely to be disclosed beyond the limits you set at your discretion. All privacy talks revolve around a single cornerstone question: “If your messenger is so secure and confidential, why does it need to know my phone number?

      Bottom line

      Any messenger is vulnerable, like any system that transfers data from client to server and from server to the next client. Although developers actively use and implement all new methods to ensure user security, the costs of an attack on a user and the price of information the attacker wants to get are critical. But more often than not, a comprehensive set of security methods applied make it possible to essentially mitigate an attack targeting a user.

      In terms of security, the most protected messenger is the one whose servers you control. Developing such a messaging app for a local corporate network is quite a feasible task. A small team of professionals can complete it within a reasonable time frame. Arranging data storage poses a much more sophisticated challenge. 

      Proper data processing matters a lot. For example, if your data is kept encrypted and the client is the only holder of the decryption key and there are no backdoors capable of dropping an extra key, you can keep the data on any servers. Otherwise, if someone other than you stores your data (for example, on the servers of a company that develops and maintains the messenger), the risk of leakage remains quite high.

      • Share:
      author avatar
      DavidBalaban

      Previous post

      Introduction to Regular Expression DOS (ReDOS)
      May 8, 2021

      Next post

      zSecurity Merch CTF Official Walkthrough
      May 11, 2021

      You may also like

      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      Common-Authentication-Bypass-Techniques_370x208
      Common Authentication Bypass Techniques
      16 March, 2023

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance