Story image

Facebook MaliciousChat vulnerability reveals dangerous ransomware exploit

08 Jun 2016

 Check Point Security recently discovered a vulnerability in Facebook One Chat and Messenger app that could allow cyber attackers to control and manipulate any Facebook chat conversation.

Check Point Security Researcher found that the Facebook MaliciousChat vulnerability can delete or change any sent message, photo, file or link sent through the chat windows.

Facebook has since patched the vulnerability, but Check Point believes these types of attacks and their vectors could be disastrous for businesses and consumers who use Facebook.

“By exploiting this vulnerability, cybercriminals could change a whole chat thread without the victim realising. What’s worse, rhe hacker could implement automation techniques to continually outsmart security measures for long-term chat alterations,” Oded Vanunu, head of products vulnerability research at Check Point, says.

The implications of the vulnerability, accessed via manipulation of the 'message_id' parameter, allows hackers access to easy ransomware demands. Check Point says although ransomware attacks only last a number of days before security vendors block the attacks, hackers can still develop ways to keep ahead of security measures.

Chat conversations can be used as legal evidence in investigations, so the vulnerability demonstrates how hackers can conceal evidence or incriminate innocent users.

Check Point says the vulnerability can also be used as a vehicle for malware, as the links can be changed to malicious ones that would look legitimate because of their sources as trusted chat partners.

Vanunu says Facebook has done a commendable job of quickly patching the issue.

New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
Used device market held back by lack of data security regulations
Mobile device users are sceptical about trading in their old device because they are concerned that data on those devices may be accessed or compromised after they hand it over.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Symantec acquires zero trust innovator Luminate Security
Luminate’s Secure Access Cloud is supposedly natively constructed for a cloud-oriented, perimeter-less world.
Palo Alto releases new, feature-rich firewall
Palo Alto is calling it the ‘fastest-ever next-generation firewall’ with integrated cloud-based DNS Security service to stop attacks.
The right to be forgotten online could soon be forgotten
Despite bolstering free speech and access to information, the internet can be a double-edged sword, because that access to information goes both ways.
Opinion: 4 Ransomware trends to watch in 2019
Recorded Future's Allan Liska looks at the past big ransomware attacks thus far to predict what's coming this year.