Black Hat has disabled features of its mobile application because attackers could have logged in as legitimate attendees, posted messages in their names and spied on the messages they sent.
The problem was discovered by mobile security vendor Lookout who detail the problem in a blog that says the method of registration and password resets were flawed.
“[W]e've removed user-to-user messaging functionality and activity feed updates out of an abundance of caution,” a spokesperson for the conference organizer UBM said in an email.
The problems stemmed from the fact that new accounts were created without email verification, and that even when users reset their passwords, authentication tokens weren’t revoked. So attackers logged in already could stay logged in.
Lookout says the problems it found several possible threats. Attackers could pretend to be someone else while making posts to the conference activity feed and when they used in-app messaging.
Spying on someone else’s account that the flaws enabled could reveal where victims would be at given times, creating a physical security risk. Spying would be persistent because of the authentication token problem.
Users who have already downloaded the app don’t have to update it; that will be done via push by the conference.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.