Wednesday, December 26, 2012

Security Loophole In Facebook?s Camera App Allowed Hackers To Hijack Accounts Over WiFi [Confirmed]

Screen Shot 2012-12-24 at 10.55.10 AMPSA to all Facebook Camera users on iOS: If you haven’t update you app in the past few days, update?it now. The older version of the app, pre-1.1.2 and released before December 21, has a?security loophole. When used over WiFi networks, malicious hackers can tap the network and hijack Camera users’ accounts, picking up information like email addresses and passwords in the process. The white-hat hacker who ID’d the problem is Mohamed Ramadan, an Egypt-based security researcher and trainer with Attack-Secure?who has also found and reported vulnerabilities for Apple, Google, and Etsy — which apparently also had the same loophole in its iOS app. Ramadan tells us that the issue lied in the Camera app’s Secure Sockets Layer certification, which was too open. As he puts it, “The problem is the app accepts any SSL certification from any source, even evil SSL certifications and this enables any attacker to perform Man in The Middle Attack against anyone uses Facebook Camera App for IPhone. This means that the application doesn?t warn the user if someone in the same [WiFi network] trying to hijack his Facebook account.” Testing his theory by using a proxy to listen in on a WiFi network, he was able to type in his username and password into the Camera app, and then see that information appear via the proxy. Ramadan notes that he’s tested all Facebook apps and the rest appear to protect from this similar vulnerability. We’ve reached out to Facebook for comment but haven’t received a response. [Update: Facebook has confirmed Ramadan's bug discovery, which it addresses in the 1.1.2 version.]

Source: http://feedproxy.google.com/~r/Techcrunch/~3/jUJWQxdqgCY/

Ravi Shankar Geminid meteor shower right to work Clackamas Town Center 12 12 12 Anne Hathaway Wardrobe Malfunction jennifer lawrence

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.