Security News > 2020 > December > Cybercriminals Already Targeting, Selling Leaked GO SMS Pro Data

Cybercriminals Already Targeting, Selling Leaked GO SMS Pro Data
2020-12-01 14:45

Cybercriminals have been observed targeting a recently disclosed vulnerability in the GO SMS Pro messaging application to steal user data.

Whenever a user attempts to send a media file, Trustwave's SpiderLabs security researchers discovered, the application would generate a URL that can be easily guessed and which does not require authentication to access the shared media.

Minor scripting can be used to target the unprotected media files and exfiltrate them, and Trustwave now says that threat actors are publicly sharing tools and scripts exploiting the bug.

"Several popular tools are updating daily and on their third or fourth revision. We've also seen underground forums sharing images downloaded from GO SMS servers directly," Trustwave says.

"Despite these half fixes, we can confirm that older media used to verify the original vulnerability is still available. That includes quite a bit of sensitive data like driver's licenses, health insurance account numbers, legal documents, and of course, pictures of a more 'romantic' nature," Trustwave says.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/_0vFjEA1YGU/cybercriminals-already-targeting-selling-leaked-go-sms-pro-data