Researcher demos Catch Notes data-stealing hole

Powered by SC Magazine
 

Malicious apps steal text, voice and video.

Updated: A security researcher has detailed a vulnerability in the popular Catch Notes application that allows an attacker to steal a users’ documents.

The vulnerability allows a malicious application to quietly steal user documents created within the latest version of Catch Notes and upload them to a remote server.

Catch Notes allows users to capture voice, video and text to be stored locally or in the cloud. It has been installed between one million and five million times, according to Google Play statistics.

Security researcher Aditya Gupta created a proof-of-concept video for SC in which he demonstrated the attack within an Android emulator.

He said it was “an example of insecure content providers”.


                              

Gupta first reported the flaw to Catch.com in May, but the email was lost.

Catch vice president of engineer Tim Kientzle said some features within the application depend on the vulnerable setting.

“We have some features that inadvertently depended on this setting, so it's not a simple matter of just turning off access,” Kientzle said.

A fix would be patched in about a month but likely miss an update scheduled for this week due to the need to rework affected components.

Version 4.5.7 fixes the hole and has been released on the Google Play store.

Kientzle said it was a local exploit meaning the team had more time to fix the hole.

He thanked Gupta for reporting the flaw.

Copyright © SC Magazine, Australia


Researcher demos Catch Notes data-stealing hole
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 310

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote