HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

HackedIN: Ghost in the wires ?? (in Australia, even criminal telcos have crappy APIs)

Introduction

In September 2024, GhostChat—an encrypted communication platform used by criminal enterprises—was taken down in a global law enforcement operation.

While the takedown was a well-coordinated, separate effort by law enforcement, my post-mortem analysis revealed that GhostChat had numerous critical vulnerabilities even before law enforcement intervention.

Background - The Takedown

GhostChat had been operational since 2015, with law enforcement targeting it starting in 2022.

The Australian Federal Police (AFP), along with global partners, infiltrated the network via malware introduced through software updates.

However, upon investigating the platform post-takedown, I discovered additional security flaws that were entirely unrelated to law enforcement’s approach. These flaws could have been exploited by criminals or other actors.

Vulnerabilities Exposed Post-Takedown

Here’s a breakdown of the critical vulnerabilities I discovered after GhostChat had already been compromised by authorities.

Exposed Development Environment

A GhostChat developer exposed passwords and API credentials in a public source-code repository.

This included information about the development server, which could be accessed publicly.

Unauthenticated API Endpoints

I found multiple API endpoints that required no authentication at all, exposing sensitive data.

For example, the /request_accounts/ API call allowed me to retrieve a list of over 1,000 GhostChat user accounts, including PGP emails, screen names, device IDs, and license expiration dates.

Internal Support Messages Exposed

Through the exposed support API, it was also possible to view internal customer support messages.

These messages revealed that users frequently requested administrators to install various applications on their devices remotely, demonstrating GhostChat’s supply chain vulnerability.

While convenient, this remote-install functionality was a glaring security hole.

Key Lessons for Companies

The vulnerabilities I discovered are not unique to GhostChat.

They represent broader security failures that any company could face if they do not prioritise basic security hygiene. Here are the core lessons for companies:

Secure Development Practices

Public repositories must be carefully managed to prevent the exposure of sensitive data. Developer credentials, API tokens, and server details should never be publicly accessible.

API Security

Authentication and authorisation should be mandatory for all API endpoints. Unauthenticated APIs can leak valuable information that could be exploited by adversaries or used for intelligence gathering.

Supply Chain Vulnerabilities

Centralised control over user devices, such as the ability to push updates or install apps remotely, should be tightly controlled and audited. Any weakness in this process could introduce significant security risks.

Proactive Monitoring

Regular audits of development environments, server configurations, and external vendor access are critical to prevent the kind of exposure that occurred with GhostChat.

Conclusion

GhostChat’s vulnerabilities provide critical lessons for both the private sector and law enforcement.

For companies, the message is clear.

Even sophisticated platforms can fall prey to basic security failures if not properly managed.

For law enforcement, these vulnerabilities offer insight into how exploitable weaknesses in platforms can provide operational advantages in intelligence gathering and criminal investigations.

Andrew Cracker

Student at University of Notre Dame

3 个月

great dude..i like it

回复
Adam Cassar

We protect websites from threats, reduce infrastructure costs, and speed up performance.

4 个月

Ghostbusters?

Ryan M.

Founder of Dejitaru | Cyber Security Services and CPD Resources

4 个月

Jamieson O'Reilly Interesting writeup. Are poorly secured APIs common?

回复
Ryan Moeller ??

Chief Financial Officer (CFO), Strategic Business Partner @Amazon (AWS) | Specialize in Driving Exponential Growth for $100M+ Companies

4 个月

Amazing work my friend

Matt Flannery

A/Director of Offensive Security, Service NSW | Co-Founder, ThreatCanary | CNCF TAG Security Tech Lead

4 个月

Great write up

要查看或添加评论,请登录

Jamieson O'Reilly的更多文章

  • HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    HackedIN: ?? Ticket-in Cash-out The 3.2 Million Dollar Question?

    Disclaimer: This document presents a speculative analysis based on publicly available information regarding the…

    3 条评论
  • HackedIN: Double or nothin'

    HackedIN: Double or nothin'

    How I hacked two of Australia's largest Casino's (legally). Disclaimer: Both Casino's have long since patched these…

    9 条评论
  • HackedIN: Hack to the Future

    HackedIN: Hack to the Future

    In today's world, the very same features we rely on for integrity and security can be used against us by attackers…

    2 条评论
  • HackedIN: Poor man's SIM porting

    HackedIN: Poor man's SIM porting

    In today's world, where interconnectivity is not just a convenience but a necessity, the security of telecommunication…

    1 条评论
  • HackedIN: I See Dev People

    HackedIN: I See Dev People

    As someone who gets paid to break into companies legally - I've learned to take a step back and look at the whole…

    6 条评论
  • HackedIN: APT, easy as 1, 2, 3

    HackedIN: APT, easy as 1, 2, 3

    Having run 100s of red-team engagements on everything from federal government agencies to crypto exchanges, I've…

  • HackedIN: Thinking outside the phishing box

    HackedIN: Thinking outside the phishing box

    As we spend more time and resources towards technology and training with the goal of protecting our users from social…

    2 条评论
  • HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    HackedIN: "You Shall Not Pass"—Unless You Exploit This Vulnerability

    In an era where Large Language Models (LLMs) like those developed by OpenAI are becoming increasingly integrated into…

    2 条评论
  • Dude where's my code?

    Dude where's my code?

    HackedIN: Dude where's my code? Security extends beyond your office walls. When you involve third parties in your…

    3 条评论
  • Video Killed the Security Star

    Video Killed the Security Star

    Protecting your business online used to be more simple. You had your IPs, domains and devices; there wasn't much more…

社区洞察

其他会员也浏览了