Application Truecaller remote exploitation vulnerability involving Android 0.1 billion

Source: Internet
Author: User

Application Truecaller remote exploitation vulnerability involving Android 0.1 billion

Security researchers at the cheetah mobile security research lab found a serious vulnerability in the call management application Truecaller.

FreeBuf encyclopedia

Truecaller, a Swedish company, collects and classifies various numbers mainly by collecting the number book and using crowdsourcing (User-provided personal address records, it then provides functions such as Momo call identification, marketing phone interception, contact management, and yellow page query. It also connects to Yelp, Twitter, and other social tools and claims to be "Google in Yellow Pages ". It has 0.15 billion million users, of which 80 million are from emerging power India.

For Android users, update them as soon as possible.

Recently, security researchers at the cheetah mobile security research lab discovered a serious vulnerability in the call management application Truecaller.

This vulnerability allows anyone to steal sensitive information from Truecaller users and provides conditions for attackers to launch attacks. In general, more than 0.1 billion Android users who have downloaded the application on their smartphones are at risk.

Researchers found that Truecaller uses the IMEI of the device as the unique identity authentication tag for its users. This means that anyone who obtains the IMEI of the device can obtain the personal information of the Truecaller user (including the phone number, home address, email address, and gender), and without the user's consent, attackers can tamper with users' APP settings to expose real users to the threat of malicious fishermen.

 

 

By exploiting this vulnerability, attackers can:

Stealing users' personal information, such as account name, gender, email, profile photos, and home address;

Modify the user's APP settings;

Disable the spam interceptor;

Add a blacklist to a user;

Deletes user blacklists.

The cheetah mobile security research team has informed related developers of Truecaller immediately after discovering the vulnerability and provided everything possible to help developers solve the problem. Now the Truecaller manufacturer has solved the problem and released an upgrade program in March 22.

Although the vulnerability has been fixed in the latest version, users who have not updated the latest version are still at risk.CM Security Research Lab experts suggest Truecaller users upgrade the application to the latest version as soon as possible.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.