Slack fixes bug that could have let hackers intercept downloads
Slack has fixed a bug that could have allowed hackers to intercept and redirect downloads in the Windows desktop version of the messaging app. However, it seems no Slack users were affected before the service fixed the vulnerability.
A researcher with cybersecurity firm Tenable found that hackers could have placed a malicious link in a Slack channel that, when clicked, would have allowed them to redirect a user's downloads to a file server belonging to the attacker. From there, the attacker obviously could have stolen the document. Since many workplaces use Slack in place of email, it seems inevitable that files with sensitive data change hands through the service.
Attackers could even have "inserted malicious code in [a document] so that when opened by victim after download [by clicking on them in Slack], their machine would have been infected," Tenable researcher David Wells, who discovered the bug, wrote. "The options from there on are endless."
As Wells suggests, a hacker might have been able to place a malicious link in a Slack channel using RSS feeds, which Slack users can add to channels. Hackers would have also been able to mask malicious links so they looked like URLs to legitimate websites.
Tenable reported the bug to Slack and it was patched in version 3.4.0 of the Windows app. "Slack investigated and found no indication that this vulnerability was ever utilized, nor reports that its users were impacted," Slack told Gizmodo. "As always, users are encouraged to [update] their apps and clients to the last available version."
source engadget
Industry: Cyber Security News
Latest Jobs
-
- Public Sector Cyber Security Sales | UK
- England
- N/A
-
Public Sector Cyber Security Sales | UK UK | Remote / Hybrid A cyber security provider is seeking a Public Sector Sales professional to drive growth across UK government and public sector organisations. Must have current Cyber Security sales experience. Responsibilities Generate new business selling cyber security solutions into UK public sector Build relationships with CIO, CISO and senior technology stakeholders Manage the full sales cycle from opportunity to contract close Develop pipeline across central government, local government and public sector bodies Support bids, tenders and framework opportunities Experience Proven cyber security sales experience in the UK Track record selling into public sector organisations Familiarity with CCS, G Cloud or other government frameworks Strong stakeholder engagement and deal management skills Location UK based Security Requirements Eligible to obtain UK Security Clearance
-
- Security Architect | MoD - Security Cleared. OUTSIDE IR35 | Hampshire
- N/A
- Outside IR35
-
Security Architect | MOD | Security Cleared | Outside IR35 | Hampshire Commutable The successful candidate must be willing to undergo DV Clearance, ideally already holding active clearance. You will produce high and low level security architecture documentation, guiding and validating designs for systems deployed within sensitive environments. The role requires providing specialist security input into solution design, service transition and change initiatives, working closely with engineering, operations, client and third party stakeholders. You must have current hands on architectural experience, including VMware secure platform design and virtualisation architecture, alongside AWS expertise. This is an outside IR35 contract- 6 month rolling. Part of a longer term MoD project