139
all 34 comments
sorted by: hot top controversial new old
[-] knightmare1147@lemmy.world 70 points 1 day ago* (last edited 1 day ago)

Tldr: Someone can guess reasonably where you are by sending you a glitched friend request notification on your phone that tells the hacker what data center you're closest to.

It is pretty clever but I wouldn't call it full deanonymizing, should still get patched though.

good find by the tester.

Edit: used the term 'glitch' for simplicity of people reading, didn't mean to upset people; I'm just an amateur.

[-] CosmicTurtle0@lemmy.dbzer0.com 30 points 1 day ago

It's not a glitched friend request notification.

It's a native friend request that you make through discord. The vulnerability lies in the attacker making a unique pfp for each request, forcing the CDN to cache the pfp at the closest data center to the user.

I would agree that it's not fully deanonymizing but it could resurrect tracking Elon and other billionaires.

[-] Petter1@lemm.ee 17 points 1 day ago

I like how you see the positive in bad news ๐Ÿ˜ƒ

[-] Fiery@lemmy.dbzer0.com 6 points 1 day ago

It's not even glitched, it's working as intended

[-] Winged_Hussar@lemmy.world 23 points 1 day ago* (last edited 1 day ago)

My favorite part might be the conversation on the Cloudflare forum where a user reports the bug that makes this possible and it ends with this:

๐Ÿ˜‚

[-] infeeeee@lemm.ee 41 points 1 day ago

Was posted yesterday to a lot of communities, it's very clickbait:

allows an attacker to grab the location of any target within a 250 mile radius

So it's a bit rough... In Europe it means basically which country the target is in. Also cloudflare servers are not evenly distributed in the world, so resolution can differ wildly worldwide.

With a vulnerable app installed on a target's phone

So it's not really zero click.

Sounds interesting though, nice writeup, but not as scary as it sounds from the title.

[-] floofloof@lemmy.ca 30 points 1 day ago

The vulnerable app can be anything that displays an attached image though. And a 250-mile radius compared to the whole world is still a very significant step for governments trying to track down dissidents, etc.

The section on responses by Cloudflare, Signal and Discord is disappointing. They're not taking it seriously enough.

[-] donuts@lemmy.world 12 points 1 day ago

so it's not really zero click

Did you keep reading after the intro?

Excerpt:

If the target has push notifications enabled (which it is by default), they don't even have to open the Signal conversation for their device to download the attachment. Once the push notification is sent to their device, it automatically downloads the image from Signal's CDN triggering the local datacenter to cache the response.

An attacker can run this deanonymization attack any time and grab a user's current location without a single interaction.

[-] Appoxo@lemmy.dbzer0.com 2 points 1 day ago

If it's still only the datacenter it doesnt matter that much.

[-] Aatube@kbin.melroy.org 4 points 1 day ago

GeoGuesser, powered by the Google Maps API, generates a likely location of the user. It finds the midpoint between the 2 datacenters and draws 2 circles that signify his radius.

[-] infeeeee@lemm.ee 4 points 1 day ago

And with SS7 they can get even more precise location, and you can't really hide from that if you want to use a phone with a phone number, what is the point. This is an interesting way of attack, noone really thought about this before, but it's not "oh-my-god everyone can be tracked via signal". I guess the closest server doesn't even selected via geographical distance, but much more depends on network infrastructure of your location, so Google Maps API can't really help here.

And again any VPN could defend against this, so if you want to hide which country you are in currently, it should be the 0th step to use a VPN.

[-] Aatube@kbin.melroy.org 2 points 1 day ago

Does everyone have access to tracking which stations send the phone signal in the SS7 network?

[-] infeeeee@lemm.ee 3 points 1 day ago

Yes, anyone can buy access.

[-] priapus@sh.itjust.works 2 points 1 day ago

The user having to have the vulnerable app installed does not make it not zero click.

[-] Aatube@kbin.melroy.org 3 points 1 day ago

Cloudflare has more servers in Europe than in North America. That does trace you to which country, which IMO is pretty significant. Especially with the GeoGuesser "average the circles" thing he coded.

Yeah, this sensational as a headline. It's a clever idea that is not simple, requires an already compromised device and user, and won't work except very specific conditions.

[-] deadcade@lemmy.deadca.de 9 points 1 day ago

""compromised device"" in this scenario is any device with a chat app installed, push notifications on, and the chat service uses Cloudflare CDN. This is a very common setup, Discord and Signal were mentioned as examples. Many others are vulnerable for the same thing. With read receipts on the chat platform (like Signal), no push notifications are required.

The headline is sensationalist, but it isn't something to be ignored. Especially for more privacy focused platforms like Signal, even leaking the country someone is in can be considered a risk. That's effectively what this attack allows.

[-] xodoh74984@lemmy.world 2 points 21 hours ago

I feel like people here have forgotten the difference between "vulnerable" and "compromised".

It matters because calling everyone's default setup chat apps compromised implies that an attack has occurred.

Already addressed in a different comment, but yes.

[-] floofloof@lemmy.ca 8 points 1 day ago* (last edited 1 day ago)

It doesn't require them to have a compromised device. If they have Signal, or something similar, you just need to message them with an image attachment, then get to work checking where that image got cached.

Not at all.

  • Phone needs to have network defaults enabled
  • Phone needs to have push notifications enabled
  • Phone needs to have background data enabled
  • No VPN
  • Attachment downloads by default in each app
  • No private DNS
  • No content blockers (lots have CDN bypass as a feature for this exact reason)

Any of these being different would not make this possible for a number of reasons. The author is talking about journalists and security minded people being at risk, but it's hard to imagine anyone going above the defaults to protect would be at much risk if they didn't take one or two of these steps as protection.

I assume from your comment you're thinking "compromised device" to mean attacked, and those are synonymous. It's just a phone with no protections.

[-] floofloof@lemmy.ca 3 points 1 day ago

That's not a compromised device though, it's a device with default settings.

Yes, which is a compromised device. A Windows machine without any antivirus or malware protection is a compromised device, for example.

Read the back half of this writeup and realize the target audience should be people with basic security steps taken. No journalist going out of their way to talk to whistleblowers is going to have a default settings phone, or any phone on them at all for that matter I would expect.

[-] xodoh74984@lemmy.world 1 points 21 hours ago

Wouldn't it be a vulnerable device? Up until the point it's compromised by downloading a malicious image?

[-] Aatube@kbin.melroy.org 2 points 1 day ago

Windows machines have default antivirus. I would not expect disabling push notifications to be a basic security measure. Pretty much everyone has push notifications, including the target audience. A lot of them also don't take a device-wide VPN because they expect only websites to track them.

Attachment downloads by default in each app

The user profile picture is not an attachment.

[-] JRaccoon@discuss.tchncs.de 12 points 1 day ago

Interesting read. One thing I don't fully get is why does Cloudflare have the airport code in the response headers anyway? I cannot think of a single reason to have it in the response.

[-] CosmicTurtle0@lemmy.dbzer0.com 4 points 1 day ago

They use airport codes for their data center identifiers.

[-] JRaccoon@discuss.tchncs.de 7 points 1 day ago

Yeah I get that, but why return that information in the HTTP response?

[-] lemmydividebyzero@reddthat.com 3 points 1 day ago* (last edited 1 day ago)

I don't get it?

Why not just sending someone a link to an image on your website? You grab the IP address and are probably closer to the actual location with less work. Or would Signal proxy the image? Then, you need to just send a link. The user clicks (1 click attack) and you get the IP address....

[-] wholookshere 1 points 23 hours ago

Most platforms proxy media shared.

Then your proposed workaround is still 1 click more than the reported one.

[-] lemmydividebyzero@reddthat.com 2 points 23 hours ago

yes, ok, but the 0 click reveals that I'm probably living in Germany (I just kind of doxed myself) and the IP can reveal the city or village I'm living in and if you cantact my ISP as law enforcement, you could probably find out my name and address...

But ok, the post is probably a bit of clickbait, because you can't do much with the information you get from this method.

[-] futatorius@lemm.ee 4 points 1 day ago* (last edited 1 day ago)

I understand the need for CDNs, but they really do have some nasty side-effects. And those seem to get worse, the more transformation is allowed to happen in CloudFlare Workers and similar services.

[-] seven_phone@lemmy.world 3 points 1 day ago

You need to up your game I can almost understand that title.

this post was submitted on 23 Jan 2025
139 points (100.0% liked)

Technology

60811 readers
3421 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS