Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Security Flaw in Truecaller Exposes Millions of Android Users

Popular phone call management application Truecaller was discovered to pack a remotely exploitable security flaw that potentially impacts 100 million Android users, researchers at Cheetah Mobile Security Research Lab warn.

Popular phone call management application Truecaller was discovered to pack a remotely exploitable security flaw that potentially impacts 100 million Android users, researchers at Cheetah Mobile Security Research Lab warn.

The vulnerability provides attackers with the possibility to steal sensitive information pertaining to Truecaller users, which could open the door to further attacks, the researchers explain. With over 100 million installs to date, the application potentially puts a large number of Android smartphones and users at risk.

According to Cheetah Mobile researchers, Truecaller uses a device’s IMEI to identify users, which means that an attacker able obtain the IMEI would be able to grab the personal information of that Truecaller user. This would include phone number, home address, mail box, gender, and more.

Users are required to provide all this information when first installing Truecaller for Android, and the application verifies accounts via a phone call or SMS message. After this initial setup, users are not required to provide login information when opening the application, because the software uses the device IMEI to authenticate them.

In addition to stealing information, attackers would also be able to modify app settings without user consent, exposing them to malicious phishers, researcher say. Furthermore, they suggest that attackers leveraging this vulnerability could also disable spam blockers on the affected devices and tamper with a user’s blacklist.

Cheetah Mobile researchers said that Truecaller was informed on the vulnerability as soon as it was discovered, and that the developer addressed the issue in an update version of the application released on March 22. However, since the majority of users still don’t have access to the update, they are still exposed.

By leveraging the vulnerability, attackers capable of having device IMEIs sent to their servers would also be able to associate these numbers with real users, thus being able to conduct more targeted attacks. To stay protected, users should update the software to the latest version as soon as possible.

Android has become the target of choice for many cybercriminals due to its high market share in the mobile segment, which allows attackers to target millions of users at the same time. Vulnerable applications, security flaws in Android itself, and malware developer’s ability to circumvent security checks, and the large number of Android malware families provide a large attack surface for opportunists.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.