FaceTime Group Chat Disabled Due to Snooping Bug - Security Boulevard

FaceTime Group Chat Disabled Due to Snooping Bug

Apple has disabled the group chat feature in its FaceTime video calling app after a bug was discovered that allows callers to remotely turn on the microphones on the recipients’ devices.

The issue was disclosed on social media and word about it spread rapidly. It works by initiating a FaceTime video call to a contact and, while it’s dialing, swipe to add another person to the call, but instead add your number.

This will start a group FaceTime call, but because of the bug, the recipient’s microphone will be turned on automatically even if they don’t answer. However, the caller will be placed in a group chat where they can hear the conversations or sounds in the recipient’s surroundings.

In essence, every time a user receives an incoming FaceTime call, the person at the other end could be eavesdropping. Even worse, if the recipient presses the power button to mute the incoming call, the front-facing camera also gets activated without them knowing.

Apple has not yet released an official statement, but the company’s System Status page now lists Group FaceTime as temporarily unavailable. It was probably turned off to prevent abuse until this issue is fixed.

“FaceTime calls are easily scripted, and many kiosks and other static applications of iOS devices (think airports, for example) likely have FaceTime-enabled by default,” said Casey Ellis, founder and CTO at Bugcrowd, via email. “My main concern now is that the fix for the issue is client-side, and clients won’t be updated and will remain vulnerable. The idea of sitting at Newark Airport and having the food-ordering kiosk (which is an iPad) watching as I eat is both a real risk, and creepy.”

Ellis also expressed concern that this bug could be used to spy on kids, especially since they typically don’t answer their phones immediately. Malicious hackers are not very likely to exploit the bug, because the caller needs to be in the victim’s contact list. However, the exploit could be used in pranks and could result in serious privacy violations.

“Even though Apple has gone through great strides to protect their user’s information, this latest bug is yet another reinforcement that privacy continues to remain a major concern regardless of your company’s size or security and privacy investments,” said George Gerchow, CSO of SumoLogic. “It’s also another reminder that nobody’s data is 100 percent safe and that it’s all of our responsibility to be more diligent in protecting the privacy of our customers’ sensitive information against future vulnerabilities.”

Exchange Vulnerability Allows Admin Access from Regular Account

Microsoft Exchange servers are vulnerable to an attack that could allow hackers to gain Domain Admin privileges after gaining control over a single mailbox.

The issue was found and disclosed by Dirk-jan Mollema, a researcher with Fox-IT, and is a combination of several factors: the high privileges by default in Exchange servers, NTLM authentication being vulnerable to relay attacks and a feature that allows attackers to force an Exchange server to authenticate to a remote server with the computer account of the Exchange server.

“Recently I came across a blog from the ZDI, in which they detail a way to let Exchange authenticate to attackers using NTLM over HTTP,” Mollema said in a blog post. “This can be combined with an NTLM relay attack to escalate from any user with a mailbox to Domain Admin in probably 90% of the organisations I’ve seen that use Exchange. This attack is possible by default and while no patches are available at the point of writing, there are mitigations that can be applied to prevent this privilege escalation.”

The default privileges and the relay attacks were known problems, but it looks like the technique of forcing a server to authenticate back to an attacker was the missing link needed to put the attack chain together.

Mollema released a proof-of-concept tool called “PrivExchange” and included several recommendations in his blog post that could help mitigate the attack. Since the problem stems from design decisions, it’s not going to be easy to fix.

Lucian Constantin

Featured eBook
Managing the AppSec Toolstack

Managing the AppSec Toolstack

The best cybersecurity defense is always applied in layers—if one line of defense fails, the next should be able to thwart an attack, and so on. Now that DevOps teams are taking  more responsibility for application security by embracing DevSecOps processes, that same philosophy applies to security controls. The challenge many organizations are facing now ... Read More
Security Boulevard

Lucian Constantin

Lucian has been covering computer security and the hacker culture for almost a decade, his work appearing in many technology publications including PCWorld, Computerworld, Network World, CIO, CSO, Forbes and The Inquirer. He has a bachelor's degree in political science, but has been passionate about computers and cybersecurity from an early age. Before he chose a career in journalism, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. You can reach him at [email protected] or @lconstantin on Twitter. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

lucian-constantin has 298 posts and counting.See all posts by lucian-constantin

One thought on “FaceTime Group Chat Disabled Due to Snooping Bug

Comments are closed.