Researchers have discovered a new vulnerability in the Signal Desktop application that allows hackers to steal messages in chats. Thus, in less than a week, this is the 2nd time that users of end-to-end encrypted messaging application Signal Desktop have

Thủ thuật

Discovered on Monday by the same team of security researchers, the newly discovered vulnerability poses the same threat as the previous one, which allows attackers to inject malicious code into the Signal Desktop app by sending users a message. without requiring any interaction from them.

phat hien lo hong moi trong ung dung signal desktop cho phep hacker danh cap tin nhan

New vulnerability discovered in Signal Desktop app that allows hackers to steal messages

The only difference between these two vulnerabilities is that the first is in the function that handles shared links in the chat and the second newly discovered vulnerability (CVE-2018-11101) is in another function that handles the validity of quoted messages, i.e. quoting a previously replied message.

phat hien lo hong moi trong ung dung signal desktop cho phep hacker danh cap tin nhan 2

In other words, to exploit the new vulnerabilities on Signal desktop versions, all an attacker needs to do is send a malicious HTML/javascript code as a message to the victim then quote/reply to the message with random texts.

If the swallow receives this citation message containing malicious codes in the app, these malicious codes will automatically execute without any interaction from the user.

Exploit Signal Code Injection to Steal Plaintext in Conversations

At this point, proof-of-concept payloads used to demonstrate code vulnerabilities in Signal are limited to embedding an iFrame HTML tag, or image, video, or audio into an application on the victim‘s computer.

However, researchers have exploited a new PoC that could allow an attacker to successfully steal all Signal chats on a victim‘s computer in remote plaintext by sending them messages.

Literally, this method of attack is aimed at “bringing down” The messaging app is end-to-end encrypted, allowing remote attackers to easily intercept users‘ plain-text conversations without breaking the encryption.

An attacker can steal Windows computer passwords

In the blog post, the researchers also added that worse, an attacker could add files from remote SMB shares using HTML iFrames, which can be abused to steal NTLMv2 hash passwords for Windows users.

As the researchers explain: “In the Windows operating system, CSPs cannot stop remote resources through the SMB protocol. In this case, remote JavaScript execution is possible by referencing the script in SMB as the source of the iframe tag. {C} {C} {C}

Although the researchers did not release any further information about this type of attack, if an attacker can exploit the infection code to force the Windows operating system to boot, automatic authentication with the controlled SMB server with 1-time logon, it will transfer the victim‘s username and NTLMv2 hash password to the attacker to access the victim‘s system.

This attack method is similar to the attack used to exploit vulnerabilities in Microsoft Outlook, which was revealed last month.

Researchers have also reported on this new vulnerability and released Signal Desktop version 1.11.0 to patch the application vulnerability on Windows, macOS, and Linux platforms.

Users are advised to update the version of the Signal Desktop application as soon as possible, download Signal Desktop here

In addition to Signal Desktop, you can choose from many other chat and messaging applications on your phone such as Zalo, Viber or Facebook Messenger, these are all the best chat applications today with many functions to meet many users

– Download Zalo here
– Download Viber here
– Download Facebook Messeger here
It wasn‘t long before Firefox was updated to version 59.0.3 when Firefox 60.0.1 was released with many new improvements, disabling WebVR on macOS. Readers can immediately update Mozilla Firefox browser to the latest version for their computer from