Despite its marketing, the app contained glaring problems with protecting user account information, according security researchers Confide, a messaging app reportedly used by U.S. White House staff, apparently had several security holes that made it easier to hack.Security consultancy IOActive found the vulnerabilities in Confide, which promotes itself as an app that offers “military-grade” end-to-end encryption.But despite its marketing, the app contained glaring problems with securing user account information, IOActive said in a Wednesday post.The consultancy noticed it could access records for 7,000 Confide users by exploiting vulnerabilities in the app’s account management system. Part of the problem resided with Confide’s API, which could be used to reveal data on user’s phone numbers and email addresses. The vulnerabilities are especially problematic, given that Confide is designed to promote privacy. Republican officials and White House staff have reportedly adopted the app over its ability to send “self-destructing” messages that delete after being read.However, the vulnerabilities found by IOActive suggest that the messaging app wasn’t using the best security practices. For instance, the app permitted users to choose easy-to-guess passwords. It also failed to stop “brute-force” attacks on user accounts, which can involve guessing user passwords through trial-and-error. Data sent from the app wasn’t always done securely, IOActive added. The software’s notification system neglected using a valid SSL (Secure Sockets Layers) server certificate to communicate over the internet. That could expose the app to a man-in-the-middle attack and allow hackers to eavesdrop on the internet traffic.In addition, the app omitted using a system to authenticate encrypted messages, meaning that Confide itself could tamper any message sent in-transit.Confide has already patched the problems. On Wednesday, the company said: “Not only have these issues been resolved, but we also have no detection of them being exploited by any other party.”But it’s not the first time that Confide has faced concerns over the app’s security. Last month, journalists noticed that the Confide app allowed them to look up the phone numbers of White House staff, including press secretary Sean Spicer.In an email, Confide said its security team is always monitoring its systems to protect users. “As issues arise, we remain committed to addressing them quickly and efficiently, as we have done in this and every instance,” it said. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe