Accéder au contenu principal

Insecurities Of WhatsApp's, Signal's, And Threema's Group Chats

Recently, the theoretical and practical analysis of secure instant messenger protocols received much attention, but the focus of prior evaluations mostly lay in one-to-one communication. In this blog post we want to presents the results of our work that focuses on group chat protocols of three major instant messenger applications; namely Signal, WhatsApp, and Threema.

In this blog post, we aim to focus on the practical impact and the found weaknesses identified by our analysis. The interested reader may also look into our paper for more details.


Our Aim and What We Were Looking For

End-to-end encryption protects the confidentiality of communication that is forwarded via central servers to the designated receivers. As a consequence, neither parties on the network route of the messages, nor the provider of the central server (e.g. the WhatsApp server) should be able to read any information out of the observation of the communication. In particular, no other user of the application should have access to the communication. Further it might be desirable to require that also the messages' integrity is end-to-end protected and that a sender is informed about the delivery state of sent messages.
Delivery state information in Signal (upper screenshot) and WhatsApp (lower screenshot)

In a two party scenario, this analysis is rather fixed to two components of the protocol: the key establishment between both parties and the communication channel protection using the established key (mostly consisting of an encryption algorithm and a scheme for providing integrity like MACs or signature schemes).

Regarded attackers


In a group setting, the same attackers apply (network, provider, other users). However the requirements for secure communication differ. It is further necessary that only group members can write to and read content from the group. Additionally, only administrators of the group are able to add new members.

In addition to these standard requirements, we also evaluated the protocols' security guarantees if the client's secrets were revealed (forward secrecy and future secrecy).

Our Approach

We analyzed the mentioned protocols by reading the source code and debugging the apps. We also used alternative open source implementations of Threema and WhatsApp as a help and we traced the network traffic. When using alternative implementations, we only took incoming traffic into account, which was generated by official applications. Thereby we extracted the protocol descriptions and evaluated them regarding the defined requirements.

Our Findings

In WhatsApp and Threema, the provider was able to manipulate the set of members. Threema only allowed the provider to rewind the set of members to a previous state. As a consequence previously removed members could have been added to the group again. The WhatsApp provider is able to arbitrarily manipulate the member set. Thereby further members and administrators can be added to the group. Since the authenticity of group manipulation is not protected, the WhatsApp provider can set the real group administrator as the source of manipulation even though this administrator was not active.

Since Signal's key exchange protocol provides future secrecy, we also evaluated the protocol's ability to recover into a secure group state after a member's state was compromised. The essential weakness here is that a sender only needs to know the static group ID to send a message to the group. If a group member receives a message with the correct group ID, no verification regarding the current member set takes place but the message is directly added to the group communication. Consequently it is sufficient to retrieve the group ID in order to send messages to the group. Since Signal treats content messages the same way as messages for the manipulation of the group set, an attacker who knows the group ID can add herself to the group and thereby read the subsequent group communication.

In addition to this, in all cases the delivery state of sent messages was not securely provided. Threema's group chats do not inform the sender about the delivery state while Signal and WhatsApp do not protect the delivery information on the end-to-end layer. Therefore the central provider can forge this information and drop messages without letting the communicating parties detect this.

Also the order of messages was manipulable for the providers of the applications such that the provider is able to deliver the messages in a different order than they were sent. Threema's weakness of rewinding a group state results from missing replay attack protection.

Impact of Weaknesses

Even though end-to-end encryption is implemented in all analyzed applications, the central providers can largely manipulate the communication in groups and partially also read it.
In all applications, the provider can undetectably drop and reorder messages during the delivery and thereby manipulate the view of the communication such that further attacks can be obfuscated.
The central servers of WhatsApp can be used to add arbitrary users to groups and thereby receive their communication.
To achieve the same result for Signal, it suffices to retrieve the group ID. An earlier member who left the group once still knows this ID since it is static. However, in contrast to WhatsApp, the origin of the manipulation is correctly displayed in the Signal application (which was not the fact when we started our analysis).

As a result, the end-to-end protection of WhatsApp is not sufficient to reach confidentiality in groups. For Signal no future secrecy is reached in groups and Threema was vulnerable to replay attacks which resulted in further weaknesses.

Responsible Disclosure

We disclosed our findings to the developers and received varying response. Threema updated their protocol in version 3.14 such that our attacks are not feasible anymore. Moxie Marlinspike responded that Signal is "working on an entirely new group mechanism that we should be deploying soon". WhatsApp did not hold out the prospect of fixing the described vulnerabilities (Update 01/18: According to Facebook's Security Head, the invite links make a fix more difficult [1]; we proposed a way to solve this issue [2]).

[1] https://twitter.com/alexstamos/status/951169036947107840
[2] https://web-in-security.blogspot.de/2018/01/group-instant-messaging-why-baming.html

Related articles


  1. Hacking Apps
  2. Hacking Apps
  3. Hacking Tools For Windows Free Download
  4. Hack Tools
  5. Hack Apps
  6. Hacking Tools For Games
  7. Free Pentest Tools For Windows
  8. Best Pentesting Tools 2018
  9. Hacking Apps
  10. Pentest Tools Apk
  11. Termux Hacking Tools 2019
  12. Pentest Tools Find Subdomains
  13. Hacker Tools Linux
  14. Hacker Techniques Tools And Incident Handling
  15. Hacking Tools For Games
  16. Hacker Tools Free Download
  17. Hacker Tools Linux
  18. Hacker Techniques Tools And Incident Handling
  19. Hacker Tools Github
  20. What Are Hacking Tools
  21. Hacks And Tools
  22. Pentest Tools List
  23. Hacking Tools And Software
  24. Hackers Toolbox
  25. Hacking Tools 2019
  26. Github Hacking Tools
  27. Hack Tools For Games
  28. Hacking Tools For Pc
  29. Tools Used For Hacking
  30. Hacker Tools For Windows
  31. Best Hacking Tools 2019
  32. Underground Hacker Sites
  33. Best Hacking Tools 2020
  34. Pentest Tools List
  35. Hacking Tools 2019
  36. Hacking Tools Name
  37. Pentest Tools For Android
  38. How To Make Hacking Tools
  39. Hack Tools Pc
  40. Best Hacking Tools 2019
  41. Hack Rom Tools
  42. Pentest Tools Framework
  43. How To Hack
  44. Pentest Tools Android
  45. Ethical Hacker Tools
  46. Github Hacking Tools
  47. Hacker Tools 2020
  48. Hacker Tools 2019
  49. Pentest Box Tools Download
  50. Pentest Tools Download
  51. Hack Tools For Pc
  52. Hack Tools For Games
  53. Best Pentesting Tools 2018
  54. Hack Tools Mac
  55. Hacker Tools List
  56. Pentest Tools Online
  57. Hack Tools
  58. Hack Website Online Tool
  59. Pentest Tools
  60. Hacking Apps
  61. Hacking Tools For Mac
  62. Hacking Tools Hardware
  63. Hack Tools Github
  64. Ethical Hacker Tools
  65. Ethical Hacker Tools
  66. Free Pentest Tools For Windows
  67. Hacking Tools Windows 10
  68. Hacker Tools Software
  69. Github Hacking Tools
  70. Android Hack Tools Github
  71. Hacking Tools For Mac
  72. Black Hat Hacker Tools
  73. Pentest Tools Bluekeep
  74. Hack Tools Github
  75. Pentest Tools For Mac
  76. Hacker Tools List
  77. Hacker Tool Kit
  78. Hacking Tools For Games
  79. Hacker Tools Free
  80. Hacker Tools Apk
  81. Pentest Tools Nmap
  82. Hacker Tools Github
  83. Hacking Tools Download
  84. Hack Rom Tools
  85. Pentest Tools Review
  86. Pentest Tools Framework
  87. Pentest Tools Bluekeep
  88. Hacker Tools Github
  89. Hacker Tools Free Download
  90. Hack Tools Pc
  91. Hack Tool Apk
  92. Hacking Tools Github
  93. Pentest Tools Alternative
  94. Hacking Tools For Windows Free Download
  95. Hack Tools For Games
  96. Hacker Techniques Tools And Incident Handling
  97. Hack Tools Mac
  98. Pentest Tools Windows
  99. Hacking Tools And Software
  100. What Is Hacking Tools
  101. Hacking Tools Usb
  102. Pentest Box Tools Download
  103. Pentest Tools Free
  104. Hacking Tools Name
  105. Pentest Tools Linux
  106. Hacker Tools Linux
  107. Pentest Tools Url Fuzzer
  108. Hacker Tools Github
  109. Pentest Tools Nmap
  110. Hacker Tools For Pc
  111. Usb Pentest Tools
  112. Hacking Tools Windows 10
  113. Hacker Tools For Mac
  114. Kik Hack Tools
  115. Hacking Tools Online
  116. Hacker Techniques Tools And Incident Handling
  117. Pentest Tools Download
  118. Pentest Tools For Windows
  119. Hacking Tools 2019
  120. Pentest Tools Subdomain
  121. Hack Tools For Pc
  122. Hacking Tools Kit
  123. Best Pentesting Tools 2018
  124. Hacker Tools 2019
  125. Pentest Tools Online
  126. Pentest Tools Windows
  127. Pentest Tools Android
  128. Tools For Hacker
  129. Pentest Tools List
  130. Hacking Tools For Games
  131. Hacker Tools Free
  132. Hacker Tools Apk Download
  133. Pentest Tools Review
  134. Hacking Tools And Software
  135. Hacking Tools Hardware
  136. Hacker Tools For Pc
  137. Hacker Hardware Tools
  138. Hacking Tools 2020
  139. Hacker Tools Mac
  140. Tools Used For Hacking
  141. Hack App
  142. Hacks And Tools
  143. Pentest Tools Android
  144. Pentest Tools Free
  145. Hacker Tools Online
  146. Game Hacking
  147. Nsa Hack Tools
  148. Hacker Tools For Pc
  149. Hack Tools Github
  150. Blackhat Hacker Tools
  151. Pentest Tools Apk
  152. Pentest Tools For Android
  153. Hacking Tools Kit
  154. Usb Pentest Tools
  155. Pentest Automation Tools
  156. Hacking Tools For Beginners

Commentaires

Posts les plus consultés de ce blog

آفرینک | تماشای آنلاین انیمیشن و کارتون

https://afarinak.com/tags/%D8%A7%D9%86%DB%8C%D9%85%DB%8C%D8%B4%D9%86-%D9%87%D8%A7%DB%8C-%D8%A8%D8%B1%D9%86%D8%AF%D9%87-%D8%A7%D8%B3%DA%A9%D8%A7%D8%B1/ https://afarinak.com/tags/%D9%BE%D8%B1%D9%81%D8%B1%D9%88%D8%B4%D8%AA%D8%B1%DB%8C%D9%86-%D8%A7%D9%86%DB%8C%D9%85%DB%8C%D8%B4%D9%86-%D9%87%D8%A7%DB%8C-2016/ https://afarinak.com/tags/best-animated-movies-2017/ https://tidano.com/ https://funibo.com/ http://www.aparat.com/afarinak https://t.me/joinchat/AAAAAD67ZyQn7_qBcGjPgw https://www.instagram.com/afarinak_com/ https://twitter.com/afarinak

Biden Trolls Trump With We Just Did Merch

Here's the place where to purchase the 'we just did 46' hat that has Joe Biden fans inquisitive on Twitter. This is what it implies. There are shirts to purchase as well. We Just Did 46 Hat Official -  https://teechip.com/we-just-did-46-hat-official The expectation was through the rooftop however the outcome was at last reached on Saturday, November seventh 2020. Joe Biden has won the US official political decision and will be initiated as the 46th president on Wednesday, January twentieth 2021. His allies were celebrating and running to online media to share their contemplations over the weekend and many have just communicated their high expectations. As featured by CNN Politics, he gave a triumph discourse in his old neighborhood of Wilmington, Delaware, in any event, tending to the individuals who didn't cast a ballot him in: "I comprehend the failure today. I've