Snapchat vulnerability can be exploited to crash iPhones, researcher says
Snapchat request tokens can be resused to launch denial-of-service attacks against the app's users
IDG News Service - A vulnerability in Snapchat allows attackers to launch denial-of-service attacks against users of the popular photo messaging app, causing their phones to become unresponsive and even crash.
According to Jaime Sanchez, the security researcher who discovered the issue, authorization tokens accompanying Snapchat requests from authenticated users don't expire.
These tokens are generated by the app for every action -- like adding friends or sending snaps -- in order to avoid sending the password every time. However, since past tokens don't expire, they can be reused from different devices to send commands through the Snapchat API (application programming interface).
"I'm able to use a custom script I've created to send snaps to a list of users from several computers at the same time," Sanchez said. "That could let an attacker send spam to the 4.6 million leaked account list in less than one hour."
Hackers exploited a different vulnerability in Snpachat at the beginning of January to extract over 4.6 million phone number and user name pairs from the service. They then posted the list online.
However, in addition to spamming a large number of users, the new issue discovered by Sanchez can also be used to attack a single user by sending him hundreds or thousands of snaps using unexpired tokens.
When this attack is performed against a user who uses Snapchat on an iPhone his device will freeze and the OS will eventually reboot itself, Sanchez said.
The researcher demonstrated the attack against the iPhone of a reporter from the Los Angeles Times with his approval by sending 1,000 messages to the reporter's Snapchat account within five seconds. A video of the demonstration was also posted on YouTube.
"Launching a denial-of-service attack on Android devices doesn't cause those smartphones to crash, but it does slow their speed," Sanchez said. "It also makes it impossible to use the app until the attack has finished."
There is a limiting factor to this attack: the default privacy setting in Snapchat that only allows accounts in a user's friends list to send him snaps, meaning the attacker would first have to convince the targeted user to add him as a friend. According to Snapchat's documentation, sending a snap to a user without being in his list of friends will result in the user receiving a notification so they can add back the sender.
Users who changed their account's default privacy setting so they can receive snaps from anyone would be directly exposed to the attack described by Sanchez.
Snapchat did not immediately respond to a request for comment.
Sanchez said via email that he didn't report the issue to Snapchat before disclosing it publicly because he feels the company has a poor attitude toward security researchers based on how it handled previous vulnerabilities reported to it. In December a security research outfit called Gibson Security published an exploit that allowed attackers to match phone numbers to Snapchat accounts after claiming that the company didn't fix the underlying vulnerability for four months.
According to Sanchez, the problem disclosed by him still hadn't been fixed Saturday, but two accounts and a VPN IP address that he used for testing had been banned. Instead of banning the accounts of a researcher who has no interest in attacking real users and doesn't even use the service, the company should work on improving the security of their application, Sanchez said.
The researcher believes preventing this issue would require an easy fix on the server side. He doesn't know why the OS crashes on iPhones, but he suspects that it has something to do with the Push Notification system that iOS devices use to receive notifications from third-party applications. The research into that aspect continues, he said.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Malware and Vulnerabilities White Papers | Webcasts