Incomplete ‘Go SMS Pro’ Patch Left Millions of Users’ Data Still Exposed Online

  • A 7 days immediately after cybersecurity scientists disclosed a flaw in the preferred GO SMS Pro messaging app, it seems the developers of the application are silently having actions to take care of the issue from behind the scenes.

    The security misstep made it attainable for an attacker to arrive up with a trivial script to entry media data files transferred in between people, together with private voice messages, pics, and films, stored on an unauthenticated, publicly accessible server.

    Though the habits was noticed on version 7.91 of GO SMS Pro for Android, the application makers have considering that introduced three subsequent updates, two of which (v7.93 and v7.94) have been pushed to the Google Enjoy Retail store following community disclosure of the flaw and Google’s elimination of the application from the market.

    Google reinstated the app back to the Play Retailer on November 23.

    Now next an evaluation of the up-to-date variations, Trustwave researchers claimed, “GOMO is attempting to repair the issue, but a complete deal with is still not accessible in the application.”

    v7.93 of the application noticed the builders totally turning off the capacity to send out media information, while the next update (v7.94) has introduced back the functionality, albeit in a damaged sort.

    “In v7.94, they are not blocking the ability to upload media in the app, but the media does not look to go anywhere,” the scientists mentioned. “The receiver does not acquire any genuine text possibly with or without the need of hooked up media. So it seems they are in the procedure of making an attempt to fix the root challenge.”

    What is a lot more, Trustwave confirmed that more mature media shared prior to the advisory are continue to accessible, which includes a cache of sensitive data like driver’s licenses, overall health insurance account numbers, lawful paperwork, and photographs of a extra “passionate” mother nature.

    Troublingly, not only resources and exploits leveraging this vulnerability have been released on Pastebin and Github underground boards look to be sharing pictures downloaded from GO SMS servers directly.

    Offered the lack of conversation from the app developers and the reality that old details is being actively leaked, it is encouraged to chorus from applying the application right up until the issues are totally patched.

    “We also assume it would be a fantastic concept for Google to choose this application back down,” the scientists stated.

    Found this article interesting? Stick to THN on Facebook, Twitter  and LinkedIn to read through a lot more exclusive written content we submit.