Dangers from social media app Clubhouse

Trend Micro News

Share post

The hype surrounding the new Clubhouse social media app continues unabated. But what about the security of the audio-only app if you use well-known people such as politicians, company bosses or employees in high positions? Comment from Udo Schneider, IoT Security Evangelist Europe at Trend Micro.

Audio-based social media apps such as Clubhouse, HearMeOut or Audlist are very popular with users, but they are associated with some security risks. Cyber ​​criminals take advantage of this by targeting weak points in the system quickly and easily with mostly automated attacks. Although some of the security risks of audio-based social media apps overlap with those of classic telephony, the potential damage at Clubhouse & Co is much greater - considering that at Clubhouse alone, up to 5.000 people can enter a room. The high number of participants increases the amount of data at risk and spread false information can easily reach thousands of people.

Research results show security flaws

  • Interception of private information: By analyzing the network traffic, an attacker can see who is talking to whom. In addition, attackers automate this process and can eavesdrop on sensitive information in a private chat.
  • Identity Fraud and Deepfake Voice: Attackers assume a false identity and can let the fake person make any statements by cloning their voice.
  • Recordings for opportunistic purposes: Voice recordings can be used in the context of identity fraud to clone user accounts, damage the reputation of the original speaker or execute fraudulent contracts.
  • Harassment and Blackmail: Depending on the structure of the app, attackers have the option of saying something or streaming pre-recorded audio material with which they can blackmail the victim. This is now done automatically by cyber criminals creating suitable scripts.
  • Purchased Followers: According to our research, alleged developers are able to reverse engineer the application programming interface (API) to create a bot in exchange for an invitation. For example, followers can be bought.
  • Concealed audio channels: Cyber ​​criminals can create covert channels for C&C servers or hide or transmit information within digital objects.

The full report Mind Your Voice: Security Risks and Recommendations for Audio-centric Social Media Platforms is available online.

 

More on this at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more