Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Cometdocs Threatens Legal Action Over Disclosure of Security Issues

Mobile cybersecurity firm Wandera has warned that document management apps made by Cometdocs can expose users’ files. Cometdocs has disputed the severity of the findings and has threatened legal action against reporters if they publish what the company considers to be inaccurate articles.

Mobile cybersecurity firm Wandera has warned that document management apps made by Cometdocs can expose users’ files. Cometdocs has disputed the severity of the findings and has threatened legal action against reporters if they publish what the company considers to be inaccurate articles.

Cometdocs provides an online document management system that enables users to convert, transfer, store and share documents and other files. The company provides tens of iOS and Android applications, as well as a desktop app that works on Windows. Users can connect the apps to their Gmail, Google Drive, iCloud, Dropbox, OneDrive and Box accounts, enabling them to directly convert files stored on these services.

Both free and paid versions of these applications are available and Cometdocs says its services have been used by millions of users. The apps are often installed on enterprise devices.

Wandera started analyzing Cometdocs’ mobile applications after noticing an unencrypted file being uploaded from one of the company’s conversion apps installed on a corporate device. The cybersecurity firm has analyzed many of the Cometdocs applications — all the iOS apps and some randomly selected Android apps — and says they have an almost identical user interface and behavior, and they communicate with servers without using encryption.Mobile apps used in enterprise environments expose user data

“The Cometdocs applications are transferring files without using encryption (via http), providing bad actors the opportunity to cache and retrieve the files. Moreover, a man-in-the-middle (MitM) attacker could access the files while ‘sniffing’ traffic on the same Wi-Fi network as the user. Because the Cometdocs apps do not use encryption when transmitting and storing files on its servers, they are allowing private information to leak into the hands of third-parties monitoring the network,” Wandera said.

It added, “The second part of the problem is that shadow IT allows risky apps like these to enter the business environment, where employees might be converting sensitive corporate documents. Without an effective policy in place to address shadow IT in a mobile environment, corporate data is at risk of falling into the wrong hands.”

Wandera has published a video showing how an attacker with access to the targeted user’s network can intercept files transmitted through the Cometdocs apps.

Contacted by SecurityWeek, Cometdocs has had an aggressive attitude and repeatedly threatened legal action “if you get anything factually incorrect or twist our words.”

Is encryption important or pointless?

Advertisement. Scroll to continue reading.

Cometdocs has argued that its apps comply with Apple and Google’s standards regarding the transmission of data over the internet and that neither companies currently require the use of an HTTPS connection for apps offered on their official application stores.

Wandera, in turn, has argued that it has not claimed Cometdocs violated the terms of the Apple App Store or Google Play store, but that Cometdocs is not following security best practices and puts potentially sensitive information at risk by doing so.

Apple at one point did plan on requiring all iOS apps in the App Store to use HTTPS, but the company appears to have dropped those plans for the time being.

“Just because Apple and Google do not require an app to use secure transport, end users trust their developers to treat sensitive information with the appropriate level of protection,” Michael Covington, VP of Product at Wandera, told SecurityWeek. “And to be clear, encryption is not a foreign concept to CometDocs; they use it in their app to protect the user’s login sequence with cloud storage sites. However, they fail to use encryption when it matters most, to protect the document itself as it is uploaded from the mobile device to the backend service that provides the conversion.”

Wandera says it has attempted to report its findings to Cometdocs on three separate occasions between December 2019 and January 2020 — twice over email and once via the contact form on Cometdocs’ website. Wandera has provided SecurityWeek screenshots showing its attempts to reach out to the vendor.

However, Cometdocs says it has not received any message from Wandera. The company has provided the following statement in response to Wandera’s research:

“Wandera is a venture funded company that has raised $53 million dollars to date. Cometdocs is a small business that offers a simple, free conversion app and has exactly $0 in funding. The reality here is that the Cometdocs app uses transmission protocols that are approved by Apple and Google and are currently used by many many apps. This “security” report is not news and in the view of Cometdocs, is simply an opportunistic attempt by a venture funded company to promote themselves at the expense of a small business.


In addition, Cometdocs has an easily viewable privacy policy available for several years that warns against transmitting sensitive data over the Internet. Data transmitted over the Internet is out of anyone’s control and is always subject to interception, regardless of what kind of protocol is used, secure or not. That is just common sense and users of any app should be aware of that. Our website is secure, and we delete from our converting servers all customer information gathered from mobile apps (documents, sizes of the files etc) within 24 hours of receipt.


Wandera claims to have reached out to us by email but we received nothing (perhaps their inquiries went to spam or were not ever sent?) and we never received any phone calls from them, if the matter was so urgent. Finally, Cometdocs wishes Wandera good luck in their attempts to grow their company at the expense of small businesses.”

Covington pointed out in response, “Wandera does not charge or benefit in any way from responsible disclosure — when we notify developers of security issues that have been identified, we are transparent with the discovery and share as many details as possible to help them pinpoint and correct the problem. There are many discoveries that are never made public because developers engage and correct issues before we must notify customers and others who may be impacted by a threat.”

Wandera reported last year that tens of thousands of iOS apps had not used encryption to protect communications.

Related: Check-in Links Sent by Several Airlines Expose Passenger Data

Related: Click-Fraud Trojan Found in Apple App Store

Related: British Airways Criticized for Exposing Passenger Flight Details

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.