Categories: NewsTech

PSA: This popular Call Recorder app for iOS might have exposed your private conversations

There’s no native call recording function within iOS, despite earlier rumours suggesting that Apple was thinking of finally introducing the functionality onto iOS 14. Still, a number of third-party apps have offered you the ability to record your phone calls, including one that has a rather straightforward name: Call Recorder. According to the official website, the app is a “Top 20 Business App” in over 20 countries, while the app boasts over 1,000,000 downloads on the App Store.

It’s for good reason, too, with the Call Recorder app able record your calls, edit the recordings, and even upload the tracks to cloud storage services like Dropbox, Google Drive, and Onedrive. However, a security vulnerability has been discovered by the founder of PingSafe AI, a security research firm. Prakash shared his findings on PingSafeAI’s blog, explaining that “we could have listened to anyone’s call recordings”—an ominous headline, to say the least.

What happened?

Basically, the researcher discovered that a bug in the app could have allowed anyone to listen to call recordings from other users on the service—by simply knowing their phone number, and a little technical know-how. The app requires a phone number to register, and Prakash used proxy tools to view and modify the in/out network traffic for the Call Recorder app. Then, he managed to switch his registered phone number for another user’s number, and access that user’s recorded calls—all from his own phone.

According to the report on PingSafe AI, the vulnerability has now been patched by the team, although the folks over at Tech Crunch discovered that over 130,000 audio recordings—about 300GB’s worth—was earlier saved on Call Recorder’s cloud storage server, and possibly susceptible to any potential attackers.

“Anand with the help of PingSafe AI’s threat intelligence product discovered this vulnerability while doing open source intelligence across mobile applications in different categories. PingSafe AI decompiled the IPA file and figured out S3 buckets, host names and other sensitive details used by the application. The vulnerability allowed any malicious actor to listen to any user’s call recording from the cloud storage bucket of the application and an unauthenticated API endpoint which leaked the cloud storage URL of the victim’s data.”

PingSafe AI

If you have the app downloaded, remember to update your app to its latest version, which was made available on the 6th of March 2021. When updating, be sure to check if your app is on version 2.26 or later—just to be safe. It’s worth noting that the Call Recorder app has free and premium tiers, but auto-renew will be on by default. If you’re keen, you can read the full, technical breakdown of the vulnerability on PingSafe AI’s blog here.

[ SOURCE , 2 ]

Recent Posts

Dongfeng Vigo and 007: Can they boost the brand’s position in Malaysia?

Slightly over a year after the brand made its debut in our market, Dongfeng has…

6 hours ago

Yes Mobile WiFi: Yes 5G offers 5G Advanced MiFi with unlimited 5G data and no FUP for RM58/month

Looking for a portable 5G Advanced mobile WiFi (MiFi) on the go? Yes 5G has…

10 hours ago

Gentari: Beware of 3rd party EV charging promotions

Gentari has released a statement to address the recent discounted Gentari Go EV charging service…

3 days ago

Xiaomi TV Stick 4K Second Gen: Google TV on a stick, priced at RM219

Want to convert almost any TV with an HDMI port into a Google TV? Xiaomi…

4 days ago

Sony WF-1000XM6: 25% better noise cancelling and improved Bluetooth connectivity, pre-order now for RM1,249

Sony has introduced the Sony WF-1000XM6 in Malaysia, its latest flagship truly wireless earbuds under…

4 days ago

GWM Wey G9 PHEV: The latest Alphard fighter in Malaysia, locally assembled in Melaka

More than a year after it was first previewed at the KL International Mobility Show…

4 days ago

This website uses cookies.