logo
DATABASE RESOURCES PRICING ABOUT US

Remotely Exploitable Bug in Truecaller Puts Over 100 Million Users at Risk

Description

[![Truecaller](https://2.bp.blogspot.com/-i1rAA9QXgKU/Vvpg6ZHbD0I/AAAAAAAAnaQ/Fipm2-Oby2stKEUzsNO15RoOHmp976gQw/s1600/truecaller-hack.png)](<https://2.bp.blogspot.com/-i1rAA9QXgKU/Vvpg6ZHbD0I/AAAAAAAAnaQ/Fipm2-Oby2stKEUzsNO15RoOHmp976gQw/s1600/truecaller-hack.png>) Security researchers have discovered a remotely exploitable vulnerability in Called ID app "**Truecaller**" that could expose personal details of Millions of its users. Truecaller is a popular service that claims to_ "search and identify any phone number,"_ as well as helps users block incoming calls or SMSes from phone numbers categorized as spammers and telemarketers. The service has mobile apps for Android, iOS, Windows, Symbian devices and BlackBerry phones. The vulnerability, [discovered](<http://www.cmcm.com/blog/en/security/2016-03-28/974.html>) by _Cheetah Mobile Security Research Lab_, affects Truecaller Android version of the app that has been downloaded more than 100 Million times. The actual problem resides in the way Truecaller identify users in its systems. While installation, Truecaller Android app asks users to enter their phone number, email address, and other personal details, which is verified by phone call or SMS message. After this, whenever users open the app, no login screen is ever shown again. This is because Truecaller uses the device's IMEI to authenticate users, according to researchers. > "Anyone gaining the IMEI of a device will be able to get Truecaller users' personal information (including the phone number, home address, mail box, gender, etc.) and tamper app settings without users' consent, exposing them to malicious phishers," Cheetah Mobile wrote in a blog post. Cheetah Mobile researchers told _The Hacker News_ that they were able to retrieve personal data belonged to other users with the help of exploit code just by interacting with Truecaller's servers. On a successful exploitation of this flaw, the attackers can: * Steal personal information like account name, gender, e-mail, profile pic, home address, and more. * Modify a user's application settings. * Disable spam blockers. * Add to a black list for users. * Delete a user's blacklist. Cheetah Mobile informed Truecaller of this flaw, and the company updated their servers as well as released an [upgraded version](<https://play.google.com/store/apps/details?id=com.truecaller&hl=en>) of its Android app on March 22 in order to prevent abuse exploiting this flaw. Truecaller said in its [blog post](<http://blog.truecaller.com/security-update-notification/>) published Monday that the vulnerability did not compromise any of its user information. If you haven’t, download the latest version of Truecaller for your Android devices from the Google Play Store Now!