{"id":18636,"date":"2022-03-31T08:10:06","date_gmt":"2022-03-31T16:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12369\/"},"modified":"2022-03-31T08:10:06","modified_gmt":"2022-03-31T16:10:06","slug":"news-12369","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12369\/","title":{"rendered":"URI spoofing flaw could phish WhatsApp, Signal, Instagram, and iMessage users"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 31 Mar 2022 15:40:38 +0000<\/strong><\/p>\n<p>There&#8217;s a flaw in the way many of the world&#8217;s most popular messaging and email platforms\u2014such as Facebook Messenger, Instagram, iMessage, Signal, and WhatsApp\u2014render URIs (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Uniform_Resource_Identifier\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Uniform Resource Identifiers<\/a>). That flaw makes it possible for phishing attempts to bypass filters and escape the trained eye, and results in apps incorrectly displaying URLs.<\/p>\n<p>The flaw can be exploited when an attacker inserts an RTLO (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Uniform_Resource_Identifier\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">right to left override<\/a>) Unicode control character, which is used to display Arabic or Hebrew messages, in a string. Because messages written in these two languages are read from right to left, once the browser or messaging application sees the RTLO character, it displays every character after it right-to-left.<\/p>\n<p>Two security researcher, <a href=\"https:\/\/github.com\/zadewg\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">zadewg<\/a> and <a href=\"https:\/\/github.com\/sickcodes\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">sick.codes<\/a>, demonstrated this rendering flaw in a GitHub post you can see <a href=\"https:\/\/github.com\/zadewg\/RIUS\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;When a message contains a valid URL, it is highlighted and marked as hyperlink. However, this is printed to screen before sanitizing Unicode Control Characters, which results in URI spoofing via specially crafted messages.&#8221;<\/p>\n<\/blockquote>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"55411\" data-permalink=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users\/attachment\/zadewg-uri-instagram-demo\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo.gif\" data-orig-size=\"480,832\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"zadewg-URI-instagram-demo\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo-173x300.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo-346x600.gif\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo-346x600.gif\" alt=\"\" class=\"wp-image-55411\" width=\"346\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo-346x600.gif 346w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/03\/zadewg-URI-instagram-demo-173x300.gif 173w\" sizes=\"auto, (max-width: 346px) 100vw, 346px\" \/><figcaption>A demo showcasing the URI rendering flaw on Instagram. (Source: zadewg&#8217;s GitHub page)<\/figcaption><\/figure>\n<\/div>\n<p>The two researchers used Google&#8217;s browser URL in a test case involving Instagram. In this case, they took <code>https:\/\/google.com\/<\/code> and combined it with the shortened URL, <code>bit.ly\/2Max1Kz#<\/code>.  They then inserted an RTLO Unicode character after the &#8220;\/&#8221; of Google&#8217;s URL and before <code>bit.ly<\/code>. Once this is sent to someone, it will look like the URL you see on the GIF above:<\/p>\n<p class=\"has-text-align-center\"><code>https:\/\/google.com\/#zK1xaM2\/yl.tib<\/code><\/p>\n<p>Notice that the <code>bit.ly<\/code> bit of the URL is flipped from the left-to-right orientation to the right-to-left orientation.<\/p>\n<p>It&#8217;s simple to do, but what are the implications of this trick?<\/p>\n<p>For one thing, it&#8217;s a tactic that attackers can use to fool potential victims by making them think what they received is legitimate. Attackers can piggyback on legitimate domains as well, such as in this demo where the domain is legitimately Google.<\/p>\n<p>Abusing the RTL has been done many times in the past, but it usually involves filenames and not URLs. Several malware authors, such as those behind Bredolab, Mahdi, and SpyEye, are known to abuse the RTLO to hide malicious file names by disguising them as Word files or PDFs in spam attachments. <\/p>\n<p>Malware Intelligence Researcher Pieter Arntz and Senior Security Researcher Jean Taggert have shown how the disguising could be done <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2014\/01\/the-rtlo-method\/\">here<\/a> and <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2013\/07\/bi-directional-trickery-%e2%95%af%e2%96%a1%e2%95%af%ef%b8%b5-o%d7%9f%c9%b9\/\">here<\/a>, respectively. Sirefef, a Trojan known for its stealth, used RTLO when <a href=\"https:\/\/threatpost.com\/sirefef-malware-found-using-unicode-right-to-left-override-technique\/102033\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">injecting malicious entries<\/a> into the affected systems&#8217; registry. And just last month, researchers from Vade Secure unearthed <a href=\"https:\/\/www.vadesecure.com\/en\/blog\/how-hackers-are-using-a-20-year-old-text-trick-to-phish-microsoft-365-users\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">a phishing campaign<\/a> that targeted Microsoft 365 users by disguising its spam attachment as a &#8220;voice message&#8221; when it was actually the phishing page in HTML format.<\/p>\n<p>As there are a handful of applications affected by this flaw, each one has been assigned a CVE number to track:<\/p>\n<ul>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-20093\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2020-20093<\/a> \u2013 Facebook Messenger 227.0 or prior for iOS and 228.1.0.10.116 or prior on Android<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-20094\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2020-20094<\/a> \u2013 Instagram 106.0 or prior for iOS and 107.0.0.11 or prior on Android<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-20095\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2020-20095<\/a> \u2013 iMessage 14.3 or older for iOS<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-20096\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2020-20096<\/a> \u2013 WhatsApp 2.19.80 or prior for iOS and 2.19.222 or prior on Android<\/li>\n<\/ul>\n<p>If you are wondering if the RTLO flaw works in emails, it doesn&#8217;t. BleepingComputer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/url-rendering-trick-enabled-whatsapp-signal-imessage-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">tested<\/a> this on Gmail, Outlook.com, and Protonmail.<\/p>\n<p>The URI spoofing flaw is still there with the current versions of Facebook Messenger, Instagram, iMessage, and WhatsApp. So, it&#8217;s best for users of these apps to exercise caution when clicking links until a patch or update is released for this flaw. Sick Codes has advised users the following:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;Turn off link previews in everything, especially mail apps and anything related to notifications. Don&#8217;t visit weird websites with popups. Don&#8217;t click random prize giveaways.<\/p>\n<p>You already have a phone, so use your bookmarks and make sure to keep it up to date. Given the amount of zero-days flying around, especially those disclosed recently for iOS, it would be perilous to trust URLs in IMs.&#8221;<\/p>\n<\/blockquote>\n<p>Stay safe!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users\/\">URI spoofing flaw could phish WhatsApp, Signal, Instagram, and iMessage users<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 31 Mar 2022 15:40:38 +0000<\/strong><\/p>\n<p>A URI spoofing flaw affecting popular messaging apps, which include Signal, Instagram, and iMessage, could direct users to potentially malicious destinations.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2022\/03\/uri-spoofing-flaw-could-phish-whatsapp-signal-instagram-and-imessage-users\/\">URI spoofing flaw could phish WhatsApp, Signal, Instagram, and iMessage users<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[25554,14359,25555,2143,25556,3924,25557,25558,25559,25560,25561,10510,18959,25562,25563,10440],"class_list":["post-18636","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bredolab","tag-facebook-messenger","tag-imessenger","tag-instagram","tag-mahdi","tag-phishing","tag-rtlo","tag-rtlo-abuse","tag-sadewg","tag-sick-codes","tag-sirefef","tag-social-engineering","tag-spyeye","tag-uri-spoofing","tag-vade-secure","tag-whatsapp"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18636"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18636\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18636"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}