♫musicjinni

BSides Lisbon 2016 - Introducing Man In The Contacts attack to trick encrypted messaging apps

video thumbnail
Mobile messaging applications have recently switched to end-to-end encryption. With debates at the government level to ask for backdoors, those tools are perceived as unbreakable. Yet, most of the implementations trust the contact information stored in the smartphone. Given that end-users hardly know a few phone numbers and that modifying contacts is easy, we will introduce a new type of attack: Man In The Contacts (MITC).

Without studying any cryptography, we will examine how WhatsApp, Telegram and Signal behave when an Android application is tampering with the contacts in background. For some scenarios, the end-user can be fooled in talking to the wrong person and a MITM proxy can be implemented.

Finally, we will discuss about countermeasures both at the technical and usability levels.

About the Speaker:
Jérémy Matos has been working in building secure software over the last 10 years. With an initial academic background as a developer, he was involved in designing and implementing a two-factor authentication product with challenging threat models, particularly when delivering a public mobile application. As a consultant he helped in the security requirements definition and implementation, including cryptographic protocols, for applications where the insider is the enemy. He also led code reviews and security validation activities for companies exposed to reputation damage. In addition, he participated in research projects to mitigate Man-In-The-Browser and Man-In-The-Mobile attacks.

BSides Lisbon 2016 - Introducing Man In The Contacts attack to trick encrypted messaging apps

BSides Lisbon 2018: Keynote - How To Build Your Own Infosec Company - Mario Heiderich

BSides Lisbon 2016 - Semi-Offline Attack on the Android Full-Disk Encryption

BSides Lisbon 2016 - Keynote: Hacking Portugal and making it a global player in Software development

BSides Lisbon 2017 - Controlling your neighbour’s lights by André Garrido

BSides Lisbon 2016 - The way of the bounty by David Sopas

BSides Lisbon 2017 - GTFO Mr. User by David Sopas

BSides Lisbon 2016 - Lessons Learned from a Bug Bounty Operator by Jonathan Claudius

BSides Lisbon 2016 - From your PC to your nearest ATM: a history of the sneakiest financial malware

BSides Lisbon 2018: A Novel Runtime Technique For Identifying Malicious Applications - Chris Le Roy

[BSL2022 Keynote] A brief history of IOT security - Elisa Costante

BSides Cleveland 109 Afternoon Keynote John Strand

BSidesLisbon2015 - Security Metrics: Why, where and how? - Tiago Henriques / Tiago Martins

BSides Rochester 2019 - More Tales From the Crypt…Analyst

BSides Leeds 2019: Confessions Of A Bug Bounty Triager - Glenn Pegden

Jessica Payne - Building Security People - BSides Portland 2018 Keynote

Bsides Tallinn #1 - Laura Kankaala: Vastaamo - When trust falls apart

BSides Vancouver 2022 Keynote: Beautiful Basics with Rob "mubix" Fuller

BSides DC 2018 - Caught my WebApp cheating on me!

BSides Rochester 2019 - The Annihilation

Hacking Back Scammers - BSides Prishtina 2022

[BSL2019] A Special Class Of Stream Cipher Backdooring Techniques - Eric Filiol

BSidesDelhi 2017 - Keynote - Thom Langford

Sleeping with the Enemy: A Best Practice Guide for Attacker Engagement

2016 - James McKinlay - What can Information Security learn from DevOps

BSides Nashville 2018 Green 00 An Oral History of Bug Bounty Programs Dustin Childs

BSidesBUD2020: Dissecting & Comparing Different Binaries to Malware Analysis - Filipi Pires

The Savage Curtain - Mobile SSL Failures (Trummer & Dalvi BSides '14)

GrrCON '11 SmartMeters: Are they a gateway drug? - Robert Former

BSides Belfast 2018: Crowdsourced Security by Yassine Aboukir

Disclaimer DMCA