Use Instagram on your iPhone? Your account can be hijacked, claims security researcher

Filed Under: Data loss, Facebook, iOS, Malware, Mobile, Security threats, Vulnerability

InstagramA security researcher on Friday published a proof-of-concept attack on Instagram for iOS that could allow malicious users to remotely hijack victims' accounts.

The session-riding vulnerability, discovered by Carlos Reventlov, springs from how Instagram handles cookies.

It's one of two issues associated with that cookie-handling that his research found in mid-November.

Reventlov notified Instagram of the problem on 11 November, but outside of an automated response, he claims he hasn't heard a peep, and the security hole still needs patching.

He writes that the issue stems from Instagram's method of sending an unencrypted, plain text cookie to the Instagram server when users start the app and perform any action that requires authentication, such as liking or unliking pictures.

A malicious user on the same LAN as the victim could launch a simple spoof with a bogus Address Resolution Protocol (ARP) message that tricks mobile devices into redirecting port 80 traffic through the attacker's machine, Reventlov says.

That gives the attacker access to Instagram's plain text cookies. With the cookies in hand, he or she can log into a victim's account, delete photos, and edit profile details

A second risk that Reventlov shared with Instagram makes iPhones susceptible to eavesdropping and man-in-the-middle (MiTM) attacks that could enable an attacker to delete photos and download data off a victim's device.

As it now stands, Instagram communicates with the Instagram API via HTTP and HTTPS connections.

Whereas sensitive activities, such as login and editing profile data, are sent through a secure channel, other requests are sent through plain HTTP without a signature.

The only authentication method for some HTTP calls is a standard cookie, sent unencrypted, when a user starts the Instagram app, Reventlov writes.

Proof of concept attack on Instagram

The security issues were tested on Instagram 3.1.2 for iPhone, which the Facebook-owned Instagram released on 23 October.

But as Secunia noted in its advisory on the plain-text disclosure issue, other Instagram versions may be affected.

The threat level is low, according to Reventlov.

The fix for the session-riding vulnerability is pretty simple, Reventlov says: The Instagram website should just use secure cookies.

As far as the earlier issue goes, Reventlov suggests that while we're waiting for a fix, users stick to HTTPS for all API requests that could contain sensitive data, such as photo URLs.

Also, the researcher recommends appending a signature for unencrypted requests.

Instagram and Facebook, image by Jonathan360Reventlov's revelations of the security vulnerabilities, and the short time period he has given Instagram to fix them before disclosing details, have not won him universal admiration.

Sophos's Graham Cluley, for instance, believes that even if Reventlov has not received a helpful response from the makers of Instagram, publishing details of how to exploit the alleged security flaws was irresponsible.

"Reventlov seems to have only given Instagram a couple of weeks to get their act together and fix their systems. That doesn't seem like long enough to me," said Cluley. "Even if he was frustrated at the lack of response from Instagram, publishing information on the net about how to exploit their systems is perhaps the wrong way to get their attention. Instead, I would have advocated Reventlov privately demonstrating the flaw to a responsible journalist, who could have put pressure on Instagram to reveal its plans for fixing the problem."

Cluley believes that public disclosure of vulnerabilities, including proof-of-concept code, can increase the chances of malicious hackers exploiting systems which contain security holes - and don't necessarily benefit the end user.

Whichever side of the debate you sit on, let's hope that Instagram fixes the problem promptly with the minimum of fuss.


, , , ,

You might like

3 Responses to Use Instagram on your iPhone? Your account can be hijacked, claims security researcher

  1. Ian McKendrick · 501 days ago

    Thanks for sharing this and bringing it to our attention.

  2. AJ Lunday · 501 days ago

    So what can we as Instagram users do to protect our phones?

  3. Well, it's no more of an issue than any website not using HTTPS.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

I've been writing about technology, careers, science and health since 1995. I rose to the lofty heights of Executive Editor for eWEEK, popped out with the 2008 crash, joined the freelancer economy, and am still writing for my beloved peeps at places like Sophos's Naked Security, CIO Mag, ComputerWorld, PC Mag, IT Expert Voice, Software Quality Connection, Time, and the US and British editions of HP's Input/Output. I respond to cash and spicy sites, so don't be shy.