Cyber AttackCyber NEWS

Amazon Alexa one-click attack can divulge personal data

By August 17, 2020 August 26th, 2020 One Comment

Researchers disclosed flaws in Amazon Alexa that could enable attackers to get admission to private information and set up capabilities on Echo devices.

Vulnerabilities in Amazon’s Alexa virtual assistant platform ought to allow attackers to get right of entry to users’ banking data records or home addresses – sincerely via persuading them to click on a malicious link.

Researchers with Check Point found quite a few net utility flaws on Amazon Alexa subdomains, together with a cross-site scripting (XSS) flaw and cross-origin resource sharing (CORS) misconfiguration. An attacker may want to remotely make the most these vulnerabilities via sending a sufferer a mainly crafted Amazon link.

“We performed this lookup to highlight how securing these gadgets is imperative to keeping users’ privacy,” said Oded Vanunu, head of products vulnerabilities research at Check Point, in lookup published Thursday. “Alexa has concerned us for a while now, given its ubiquity and connection to IoT devices. It’s these mega digital structures that can damage us the most. Therefore, their security degrees are of indispensable importance.”

Researchers disclosed their lookup findings to Amazon in June 2020. Amazon constant the security issues, and researchers publicly disclosed the flaws on Thursday.

The Flaws

Researchers examined the mobile software that connects to Alexa. After the use of a Frida SSL unpinning script to pass by the SSL pinning mechanism utilized for defending the traffic, they have been capable to view traffic transmitted between the app and the Echo system in cleartext.

From there, they determined that quite a number of requests made through the app had a misconfigured CORS policy. CORS is an approach enabling sources on certain, allowed internet pages to be requested outdoor the domain with the useful resource of XMLHttpRequest. But when misconfigured, this policy can be bypassed in order to send requests from a domain controlled thru a malicious party.

This misconfiguration should permit attackers to send precisely Ajax requests from any different Amazon sub-domain. “This should doubtlessly have allowed attackers with code-injection competencies on one Amazon subdomain to perform a cross-domain assault on another Amazon subdomain,” stated researchers.

Further Reports

Researchers then observed that it is feasible to chain together both this CORS misconfiguration and an XSS flaw in the app, permitting them to make a unique request to return a listing of all the hooked up competencies on Alexa. In response to this request, the app additionally sent lower back the CSRF token in the response. A CSRF token is a unique, secret fee generated with the aid of the server-side utility and transmitted to the consumer with the aid of HTTP request.  Access to this CSRF token can supply plausible attackers the potential to then function movements on behalf of the victim.

Alexa, Google Home and different virtual assistants have been discovered to have serious safety and privacy problems over the years. In 2019, researchers disclosed a new way to exploit Alexa and Google Home clever speakers to secret agent on users. In 2018 a proof-of-concept Amazon Echo Skill showed how attackers can abuse the Alexa virtual assistant to eavesdrop on customers with smart gadgets – and routinely transcribe every phrase said. Other privacy troubles – such as allegations of Alexa secretly recording children and users – have put the AI assistant in the spotlight.

These incidents – and this most current flaw – spotlight the need for Alexa customers to consider simply how a lot of facts the voice assistant is collecting.

Join the discussion One Comment

Leave a Reply

Report an incident