Thursday, 27 August 2020

Insecurities Of WhatsApp's, Signal's, And Threema's Group Chats

Recently, the theoretical and practical analysis of secure instant messenger protocols received much attention, but the focus of prior evaluations mostly lay in one-to-one communication. In this blog post we want to presents the results of our work that focuses on group chat protocols of three major instant messenger applications; namely Signal, WhatsApp, and Threema.

In this blog post, we aim to focus on the practical impact and the found weaknesses identified by our analysis. The interested reader may also look into our paper for more details.


Our Aim and What We Were Looking For

End-to-end encryption protects the confidentiality of communication that is forwarded via central servers to the designated receivers. As a consequence, neither parties on the network route of the messages, nor the provider of the central server (e.g. the WhatsApp server) should be able to read any information out of the observation of the communication. In particular, no other user of the application should have access to the communication. Further it might be desirable to require that also the messages' integrity is end-to-end protected and that a sender is informed about the delivery state of sent messages.
Delivery state information in Signal (upper screenshot) and WhatsApp (lower screenshot)

In a two party scenario, this analysis is rather fixed to two components of the protocol: the key establishment between both parties and the communication channel protection using the established key (mostly consisting of an encryption algorithm and a scheme for providing integrity like MACs or signature schemes).

Regarded attackers


In a group setting, the same attackers apply (network, provider, other users). However the requirements for secure communication differ. It is further necessary that only group members can write to and read content from the group. Additionally, only administrators of the group are able to add new members.

In addition to these standard requirements, we also evaluated the protocols' security guarantees if the client's secrets were revealed (forward secrecy and future secrecy).

Our Approach

We analyzed the mentioned protocols by reading the source code and debugging the apps. We also used alternative open source implementations of Threema and WhatsApp as a help and we traced the network traffic. When using alternative implementations, we only took incoming traffic into account, which was generated by official applications. Thereby we extracted the protocol descriptions and evaluated them regarding the defined requirements.

Our Findings

In WhatsApp and Threema, the provider was able to manipulate the set of members. Threema only allowed the provider to rewind the set of members to a previous state. As a consequence previously removed members could have been added to the group again. The WhatsApp provider is able to arbitrarily manipulate the member set. Thereby further members and administrators can be added to the group. Since the authenticity of group manipulation is not protected, the WhatsApp provider can set the real group administrator as the source of manipulation even though this administrator was not active.

Since Signal's key exchange protocol provides future secrecy, we also evaluated the protocol's ability to recover into a secure group state after a member's state was compromised. The essential weakness here is that a sender only needs to know the static group ID to send a message to the group. If a group member receives a message with the correct group ID, no verification regarding the current member set takes place but the message is directly added to the group communication. Consequently it is sufficient to retrieve the group ID in order to send messages to the group. Since Signal treats content messages the same way as messages for the manipulation of the group set, an attacker who knows the group ID can add herself to the group and thereby read the subsequent group communication.

In addition to this, in all cases the delivery state of sent messages was not securely provided. Threema's group chats do not inform the sender about the delivery state while Signal and WhatsApp do not protect the delivery information on the end-to-end layer. Therefore the central provider can forge this information and drop messages without letting the communicating parties detect this.

Also the order of messages was manipulable for the providers of the applications such that the provider is able to deliver the messages in a different order than they were sent. Threema's weakness of rewinding a group state results from missing replay attack protection.

Impact of Weaknesses

Even though end-to-end encryption is implemented in all analyzed applications, the central providers can largely manipulate the communication in groups and partially also read it.
In all applications, the provider can undetectably drop and reorder messages during the delivery and thereby manipulate the view of the communication such that further attacks can be obfuscated.
The central servers of WhatsApp can be used to add arbitrary users to groups and thereby receive their communication.
To achieve the same result for Signal, it suffices to retrieve the group ID. An earlier member who left the group once still knows this ID since it is static. However, in contrast to WhatsApp, the origin of the manipulation is correctly displayed in the Signal application (which was not the fact when we started our analysis).

As a result, the end-to-end protection of WhatsApp is not sufficient to reach confidentiality in groups. For Signal no future secrecy is reached in groups and Threema was vulnerable to replay attacks which resulted in further weaknesses.

Responsible Disclosure

We disclosed our findings to the developers and received varying response. Threema updated their protocol in version 3.14 such that our attacks are not feasible anymore. Moxie Marlinspike responded that Signal is "working on an entirely new group mechanism that we should be deploying soon". WhatsApp did not hold out the prospect of fixing the described vulnerabilities (Update 01/18: According to Facebook's Security Head, the invite links make a fix more difficult [1]; we proposed a way to solve this issue [2]).

[1] https://twitter.com/alexstamos/status/951169036947107840
[2] https://web-in-security.blogspot.de/2018/01/group-instant-messaging-why-baming.html

More information


  1. Hacker Search Tools
  2. Tools 4 Hack
  3. Pentest Tools Apk
  4. Hacking Tools Download
  5. Hack Tools Download
  6. Hack Tools For Games
  7. Android Hack Tools Github
  8. Hacking Tools 2020
  9. Tools For Hacker
  10. Pentest Tools List
  11. World No 1 Hacker Software
  12. Hacking Tools Hardware
  13. Pentest Tools Find Subdomains
  14. Hack Tools For Mac
  15. Hacker Search Tools
  16. Black Hat Hacker Tools
  17. Hacking Tools For Windows Free Download
  18. Hacker Tools Free
  19. Hacker Tools Apk
  20. Hacker Tools Mac
  21. Pentest Tools For Android
  22. Hack Tools 2019
  23. Hacking Apps
  24. Pentest Tools Subdomain
  25. Hacker Tools Software
  26. Hack Tools For Pc
  27. Pentest Tools
  28. Blackhat Hacker Tools
  29. Hack Tools Pc
  30. Hack Tools For Mac
  31. Hacking Tools Name
  32. Pentest Tools Alternative
  33. Best Pentesting Tools 2018
  34. Hacker Search Tools
  35. Hack Tools
  36. Pentest Box Tools Download
  37. Android Hack Tools Github
  38. Pentest Box Tools Download
  39. Physical Pentest Tools
  40. Hacking Tools For Windows
  41. Pentest Tools Linux
  42. Android Hack Tools Github
  43. Hack Tool Apk
  44. New Hack Tools
  45. Kik Hack Tools
  46. Hacker Tools For Ios
  47. Pentest Tools Online
  48. Hack Tool Apk No Root
  49. Pentest Tools Free
  50. Wifi Hacker Tools For Windows
  51. Pentest Tools Online
  52. Free Pentest Tools For Windows
  53. Hacker Tools For Ios
  54. Hacking Tools And Software
  55. Kik Hack Tools
  56. Hacking Tools Kit
  57. Underground Hacker Sites
  58. Easy Hack Tools
  59. Hacker Tools For Pc
  60. Hacking Tools Usb
  61. Pentest Tools Nmap
  62. What Are Hacking Tools
  63. Nsa Hack Tools Download
  64. Usb Pentest Tools
  65. Free Pentest Tools For Windows
  66. Pentest Tools Alternative
  67. Hack And Tools
  68. Hack Tools For Mac
  69. Hacks And Tools
  70. Wifi Hacker Tools For Windows
  71. Pentest Tools Website Vulnerability
  72. Pentest Tools For Mac
  73. Hacking Tools Pc
  74. Hacker Tools Software
  75. Pentest Tools Bluekeep
  76. Hacking Tools Mac
  77. Hacker Tools 2019
  78. Hack Website Online Tool
  79. Hackers Toolbox
  80. Hack Tools Github
  81. Pentest Tools For Windows
  82. Nsa Hacker Tools
  83. Hacking Tools For Kali Linux
  84. Nsa Hacker Tools
  85. Hack Tools Pc
  86. Pentest Tools For Windows
  87. Top Pentest Tools
  88. Hack Tool Apk No Root
  89. Pentest Tools Review
  90. Hacking Tools Kit
  91. Hack Tools Online
  92. Pentest Tools Windows
  93. Hacker Tools Free Download
  94. World No 1 Hacker Software
  95. Hacking Tools And Software
  96. Hacking Tools Online
  97. Hack Tools For Mac
  98. Hack Tools Online
  99. Hak5 Tools
  100. How To Install Pentest Tools In Ubuntu
  101. Pentest Tools For Windows
  102. Pentest Tools Port Scanner
  103. Pentest Tools Apk
  104. Hacking Tools Software
  105. Computer Hacker
  106. Pentest Reporting Tools
  107. Pentest Tools Apk
  108. Hacker Tools Software
  109. Underground Hacker Sites
  110. Pentest Tools Linux
  111. Pentest Reporting Tools
  112. Hack Tools Online
  113. Computer Hacker
  114. Best Hacking Tools 2020
  115. Pentest Tools Subdomain
  116. Hacking Tools Software
  117. Best Pentesting Tools 2018
  118. Game Hacking
  119. Pentest Tools Open Source
  120. Hacking Apps
  121. Hacker Tools Online
  122. How To Install Pentest Tools In Ubuntu
  123. Tools 4 Hack
  124. Growth Hacker Tools
  125. Termux Hacking Tools 2019
  126. Hacking Tools Usb
  127. Ethical Hacker Tools
  128. Hack Tools For Games
  129. Bluetooth Hacking Tools Kali
  130. Hacking Tools For Games
  131. Hacking Tools For Pc
  132. Nsa Hack Tools
  133. Pentest Tools Review
  134. How To Make Hacking Tools
  135. Wifi Hacker Tools For Windows
  136. Beginner Hacker Tools
  137. Computer Hacker
  138. Pentest Tools Website Vulnerability
  139. Pentest Tools Open Source
  140. Best Pentesting Tools 2018
  141. Hacking Tools Online
  142. Install Pentest Tools Ubuntu
  143. Hacking Tools For Beginners
  144. Hak5 Tools
  145. Hacker Tools Hardware
  146. Pentest Tools Bluekeep
  147. Hack Tools For Windows
  148. Hacker Search Tools
  149. Hack Tools
  150. Hacker Tools Apk
  151. Hacking Apps
  152. Pentest Tools Free
  153. Hacker Hardware Tools
  154. Pentest Tools Apk
  155. Hacker
  156. Hak5 Tools
  157. How To Make Hacking Tools
  158. Pentest Reporting Tools
  159. Pentest Tools Nmap
  160. Hacking Tools For Games
  161. Hacking Tools Hardware
  162. Hacker Tools Free Download
  163. Pentest Tools Windows
  164. Pentest Automation Tools
  165. Top Pentest Tools
  166. Hacking Tools For Pc
  167. Pentest Tools For Mac
  168. Hacker Tools 2019
  169. Hack Tools
  170. Hacker Tools Apk
  171. Hacker Tools Apk Download
  172. Hack Tools
  173. What Are Hacking Tools
  174. Hack Apps
  175. Pentest Tools Android
  176. Pentest Tools Port Scanner

No comments:

Post a Comment