Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

BlackBerry 10 Vulnerable to MiTM Attack

16/10/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmdkvmzevnzqyl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

BlackBerry is struggling enough in the smartphone wars as it is, but the venerable pocket assistant company has been dealt a blow: a vulnerability around the BlackBerry World app store has been discovered, which would allow spoofing in order to serve up malicious files.

The flaw affects BlackBerry 10 smartphone customers running the BlackBerry World widget, which device-owners use to search for and download apps. According to the BlackBerry advisory, the problem exists in the BlackBerry World service’s download mechanism, and opens the door to a man-in-the-middle attack.

An attacker could essentially masquerade as the app store, so that a user would think that they are downloading an official app from an official source, when in fact it’s a malicious file from a fake source.

After using a MiTM approach to intercept a user’s BlackBerry World application download, and the rogue app is installed on the phone, nefarious sorts can use the malware to gain access to any data or settings allowed by the app permissions that the user granted.

“BlackBerry customer risk is limited both by the requirement that customers must first connect to an attacker-controlled network, and by the inability of a potential attacker to force exploitation of the vulnerability without customer interaction,” the company stressed.

It added, “Successful exploitation requires an attacker to intercept a user’s application download/update request from BlackBerry World over a compromised network and replace the response from the server with a malicious file. [It also] requires that a user accept the permissions and install the malicious app.”

The company also noted that BlackBerry World employs application integrity checking and secure download methods to ensure that the correct app is downloaded and installed.

The vulnerability is not currently being exploited, the company said, and BlackBerry has issued a fix.

BlackBerry is struggling enough in the smartphone wars as it is, but the venerable pocket assistant company has been dealt a blow: a vulnerability around the BlackBerry World app store has been discovered, which would allow spoofing in order to serve up malicious files.

The flaw affects BlackBerry 10 smartphone customers running the BlackBerry World widget, which device-owners use to search for and download apps. According to the BlackBerry advisory, the problem exists in the BlackBerry World service’s download mechanism, and opens the door to a man-in-the-middle attack.

An attacker could essentially masquerade as the app store, so that a user would think that they are downloading an official app from an official source, when in fact it’s a malicious file from a fake source.

This article has been extracted from http://www.infosecurity-magazine.com/, please click on this link to read the article in full http://www.infosecurity-magazine.com/news/blackberry-10-vulnerable-to-mitm/

Montash is a multi-award winning, global IT recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy & Technologies, Demand IT and Business Engagement, Digital and E-commerce, Leadership Talent, Infrastructure and Service Delivery, Project and Programme Delivery.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...