MEGA Security Update : comparemela.com

MEGA Security Update

AUCKLAND, New Zealand, June 22, 2022 /PRNewswire/ --Today, MEGA has released software updates that fix a critical vulnerability reported by researchers at one of Europe's leading universities, ETH Zurich, Switzerland. Further updates addressing less severe identified issues will follow in the near future.MEGA is not aware of any user accounts being compromised by these vulnerabilities. Who is potentially affected? Customers who have logged into their MEGA account at least 512 times (the more, the higher the exposure). Note that resuming an existing session does not count as a login. While all MEGA client products use permanent sessions by default, some third-party clients such as Rclone do not, so their users may be exposed. Who could have exploited the vulnerability? Very few: An attacker would have had to first gain control over the heart of MEGA's server infrastructure or achieve a successful man-in-the-middle attack on the user's TLS connection to MEGA. What could have been the outcome? Once a targeted account had made enough successful logins, incoming shared folders, MEGAdrop files and chats could have been decryptable. Files in the cloud drive could have been successively decrypted during subsequent logins. Furthermore, files could have been placed in the account that appear to have been uploaded by the account holder (a "framing" attack). Detailed discussion On 24 March 2022, a team of researchers from the Applied Cryptography group at the Department of Computer Science, ETH Zurich, alerted us to a total of five vulnerabilities in MEGA's cryptographic architecture that would allow an attacker who is in control of MEGA's API back-end or who is able to mount a TLS man-in-the-middle attack to undermine certain cryptographic assurances expected by MEGA users. For MEGA, as an end-to-end-encrypted (E2EE) storage provider with high standards, this is a serious matter, whereas forproviders not using E2EE, such as Dropbox, OneDrive or Google Drive, a compromised back-end or man-in-the-middle attack is of course always fatal. Their privacy guarantees to users are entirely based on policy. The reported vulnerabilities would have required MEGA to become a bad actor against certain of its users, or otherwise could only be exploited if another party compromised MEGA's API servers or TLS connections without being noticed. Vulnerabilities In practical terms, the identified vulnerabilities would have enabled an attacker who controls the MEGA API infrastructure or the client-API TLS connection, to: A. Incrementally accumulate some information every time a MEGA user logs in using their username and password (vulnerability 1). After at least 512 such logins, the collected information enables the attacker to decrypt parts of the account and also leverage further logins to successively decrypt the remainder of it (vulnerability 2), ultimately resulting in the privacy and integrity (vulnerability 3) of all stored data and chats to be destroyed. B. Insert arbitrary files into a user's account if the attacker has knowledge of at least one file link exported by the account (vulnerability 4). However, the files so inserted can be easily identified. One further issue, in the legacy chat key exchange mechanism (vulnerability 5), requires too many client interactions to be exploitable in practice without further optimisation. Risk Assessment Despite the fact that few users log in often enough to make scenario A work, the issue does undermine MEGA's most fundamental design goal: Ensuring the privacy of the stored user files and messages as long as a unique password with sufficient entropy is used and none of the endpoint devices have been compromised. It is the very point of E2EE that even if a provider's API servers become controlled by an adversary, the encrypted user data should never be readable by the attacker - not even after 512 logins. While users who have logged in less than 512 times are safe, those who exceeded that threshold depend on a number of factors beyond their control, such as the security of MEGA's API servers and the integrity of their TLS connections to the same (our native apps pin the API's public TLS key, making man-in-the-middle attacks harder). Scenario B merely adds another way of (identifiably) planting files in a user account. Others exist: Folder links are not integrity-protected and carry the required meta AES key, and the mechanics underpinning the MEGAdrop feature could be leveraged in a similar manner. ETHZ Research Results The whitepaper published today represents the gold standard in cryptographic research, and we are extremely grateful for the privilege of having been chosen as a target. Seeing how seemingly innocuous cryptographic design shortcuts taken almost a decade ago backfire under scrutiny by three of the sector's brightest minds is both frightening and intellectually fascinating. The very high threshold of exploitability, despite the broad range of identified cryptographic flaws, provides a certain sense of relief. Remedial Action Fixing flaws in cloud-based cryptographic systems can be difficult and cause significant user pain - they typically have to upgrade the client software on all devices and then convert their account to a new, backwards-incompatible, format. If they share resources with other accounts, all of them may have to undergo the procedure before they can resume work. Retrofitting an integrity check that renders the primary attack vector - information gathering through corrupting the RSA private key when the user logs in - impractically difficult to exploit is a less burdensome option, as it can be deployed by way of a simple client software update. We have done that and urge all users who are logging in frequently to upgrade their MEGA app as soon as possible. We also invite vendors of third-party client software to upgrade to the latest MEGA SDK, and those who maintain their own MEGA API client implementation, to add an equivalent fix. While we understand all of the suggested improvements presented in the whitepaper, we have implemented those fixes that are necessary and practical. We have released updates to all client software to mitigate vulnerabilities 1 and 2, which also mitigates vulnerability 3. These updates have no impact on user experience and do not require any password changes or re-encryption of stored data. Summary ETHZ researchers identified highly complex issues that could potentially be exploited against certain users, either by MEGA acting maliciously or by an external party acting similarly but in even more complex circumstances. The vulnerabilities have been patched by MEGA in all current software versions. MEGA has made a significant vulnerability payment to the researchers and welcomes reports from any other party. Our Whitepaper has been updated to provide further detail on our cryptographic processing, including the current fixes. See https://mega.nz/SecurityWhitepaper.pdf Credits We wish to thank Matilda Backendal, Miro Haller and Prof. Dr. Kenneth G. Paterson for their outstanding work. Vulnerability Summary # Cause Potential Result Circumstances Characterisation MEGA Response 1 Lack of integrity protection of ciphertexts containing keys. User-encrypted data could be decrypted. User has to log in, with their secret password, more than 512 times. Novel attack vector withknown lattice techniques. All clients have been upgraded to prevent this attack. 2 Lack of integrity protection of ciphertexts containing keys. User-encrypted data could be decrypted. User has to log in, with their secret password, more than 512 times. Entirely novel kind of attack. All clients have been upgraded to prevent this attack. 3 Breach of integrity of file ciphertexts. Allows a malicious service provider to insert chosen files into users' cloud storage. Previous plaintext recovery attack is used to obtain a suitable node key and then construct an encrypted file. Non-trivial because the adversary cannot properly encrypt node keys without access to the user's master key. All clients have been upgraded to prevent this attack. 4 Breac

Related Keywords

Zurich , Züsz , Switzerland , New Zealand , Canada , Kennethg Paterson , Matilda Backendal , Miro Haller , Instagram , Department Of Computer Science , Omega Ltd , Twitter , European Commission , Facebook , Applied Cryptography , Computer Science , Google Drive , Auckland , June 22 , 022 Prnewswire Today , Ega Has Released Software Updates That Fixa Critical Vulnerability Reported By Researchers At One Of Europe 39s Leading Universities , Eth Zurich , Witzerland Further Updates Addressing Less Severe Identified Issues Will Follow In The Near Future Mega Is Not Aware Of Any User Accounts Being Compromised By These Vulnerabilities Who Potentially Affected Customers Have Logged Into Their Account At Least 512 Times More , He Higher The Exposure Note That Resuming An Existing Session Does Not Count Asa Login While All Mega Client Products Use Permanent Sessions By Default , Ome Third Party Clients Such As Rclone Do Not , O Their Users May Be Exposed Who Could Have Exploited The Vulnerability Very Few An Attacker Would Had To First Gain Control Over Heart Of Mega 39s Server Infrastructure Or Achievea Successful Man In Middle Attack On User Tls Connection What Been Outcome Oncea Targeted Account Made Enough Logins , Ncoming Shared Folders , Egadrop Files And Chats Could Have Been Decryptable In The Cloud Drive Successively Decrypted During Subsequent Logins Furthermore , Iles Could Have Been Placed In The Account That Appear To Uploaded By Holdera Quot Framing Attack Detailed Discussion On 24 March 2022 , A Team Of Researchers From The Applied Cryptography Group At Department Computer Science , Lerted Us Toa Total Of Five Vulnerabilities In Mega 39s Cryptographic Architecture That Would Allow An Attacker Who Is Control Api Back End Or Able To Mounta Tls Man The Middle Attack Undermine Certain Assurances Expected By Users For , S An End To Encrypted E2ee Storage Provider With High Standards , His Isa Serious Matter , Hereas Forproviders Not Using E2ee , Such As Dropbox , Onedrive Or Google Drive , A Compromised Back End Or Man In The Middle Attack Is Of Course Always Fatal Their Privacy Guarantees To Users Are Entirely Based On Policy Reported Vulnerabilities Would Have Required Mega Becomea Bad Actor Against Certain Its , R Otherwise Could Only Be Exploited If Another Party Compromised Mega 39s Api Servers Or Tls Connections Without Being Noticed Vulnerabilities In Practical Terms , He Identified Vulnerabilities Would Have Enabled An Attacker Who Controls The Mega Api Infrastructure Or Client Tls Connection , Oa Incrementally Accumulate Some Information Every Timea Mega User Logs In Using Their Username And Password Vulnerability 1 After At Least 512 Such Logins , He Collected Information Enables The Attacker To Decrypt Parts Of Account And Also Leverage Further Logins Successively Remainder It Vulnerability 2 , Ltimately Resulting In The Privacy And Integrity Vulnerability 3 Of All Stored Data Chats To Be Destroyedb Insert Arbitrary Files Intoa User 39s Account If Attacker Has Knowledge At Least One File Link Exported By 4 However , He Files So Inserted Can Be Easily Identified One Further Issue , N The Legacy Chat Key Exchange Mechanism Vulnerability 5 , Equires Too Many Client Interactions To Be Exploitable In Practice Without Further Optimisation Risk Assessment Despite The Fact That Few Users Log Often Enough Make Scenarioa Work , He Issue Does Undermine Mega 39s Most Fundamental Design Goal Ensuring The Privacy Of Stored User Files And Messages As Long Asa Unique Password With Sufficient Entropy Is Used None Endpoint Devices Have Been Compromised It Very Point E2ee That Even Ifa Provider Api Servers Become Controlled By An Adversary , He Encrypted User Data Should Never Be Readable By The Attacker Not Even After 512 Logins While Users Who Have Logged In Less Than Times Are Safe , Hose Who Exceeded That Threshold Depend Ona Number Of Factors Beyond Their Control , Uch As The Security Of Mega 39s Api Servers And Integrity Their Tls Connections To Same Our Native Apps Pin Public Key , Aking Man In The Middle Attacks Harder Scenariob Merely Adds Another Way Of Identifiably Planting Files Ina User Account Others Exist Folder Links Are Not Integrity Protected And Carry Required Meta Aes Key , Nd The Mechanics Underpinning Megadrop Feature Could Be Leveraged Ina Similar Manner Ethz Research Results Whitepaper Published Today Represents Gold Standard In Cryptographic , Nd We Are Extremely Grateful For The Privilege Of Having Been Chosen Asa Target Seeing How Seemingly Innocuous Cryptographic Design Shortcuts Taken Almosta Decade Ago Backfire Under Scrutiny By Three Sector 39s Brightest Minds Is Both Frightening And Intellectually Fascinating Very High Threshold Exploitability , Espite The Broad Range Of Identified Cryptographic Flaws , Rovidesa Certain Sense Of Relief Remedial Action Fixing Flaws In Cloud Based Cryptographic Systems Can Be Difficult And Cause Significant User Pain They Typically Have To Upgrade The Client Software On All Devices Then Convert Their Account Toa New , Backwards Incompatible , Ormat If They Share Resources With Other Accounts , Ll Of Them May Have To Undergo The Procedure Before They Can Resume Work Retrofitting An Integrity Check That Renders Primary Attack Vector Information Gathering Through Corrupting Rsa Private Key When User Logs In Impractically Difficult Exploit Isa Less Burdensome Option , S It Can Be Deployed By Way Ofa Simple Client Software Update We Have Done That And Urge All Users Who Are Logging In Frequently To Upgrade Their Mega App As Soon Possible Also Invite Vendors Of Third Party The Latest Sdk , Nd Those Who Maintain Their Own Mega Api Client Implementation , O Add An Equivalent Fix While We Understand All Of The Suggested Improvements Presented In Whitepaper , E Have Implemented Those Fixes That Are Necessary And Practical We Released Updates To All Client Software Mitigate Vulnerabilities 1 2 , Hich Also Mitigates Vulnerability 3 These Updates Have No Impact On User Experience And Do Not Require Any Password Changes Or Re Encryption Of Stored Data Summary Ethz Researchers Identified Highly Complex Issues That Could Potentially Be Exploited Against Certain Users , Ither By Mega Acting Maliciously Or An External Party Similarly But In Even More Complex Circumstances The Vulnerabilities Have Been Patched All Current Software Versions Has Madea Significant Vulnerability Payment To Researchers And Welcomes Reports From Any Other Our Whitepaper Updated Provide Further Detail On Cryptographic Processing , Ncluding The Current Fixes See Https Mega Nz Securitywhitepaper Pdf Credits We Wish To Thank Matilda Backendal , Iro Haller And Prof Dr Kennethg Paterson For Their Outstanding Work Vulnerability Summary Cause Potential Result Circumstances Characterisation Mega Response 1 Lack Of Integrity Protection Ciphertexts Containing Keys User Encrypted Data Could Be Decrypted Has To Log In , Ith Their Secret Password , Ore Than 512 Times Novel Attack Vector Withknown Lattice Techniques All Clients Have Been Upgraded To Prevent This 2 Lack Of Integrity Protection Ciphertexts Containing Keys User Encrypted Data Could Be Decrypted Has Log In , Ore Than 512 Times Entirely Novel Kind Of Attack All Clients Have Been Upgraded To Prevent This 3 Breach Integrity File Ciphertexts Allowsa Malicious Service Provider Insert Chosen Files Into Users 39 Cloud Storage Previous Plaintext Recovery Is Used Obtaina Suitable Node Key And Then Construct An Encrypted Non Trivial Because The Adversary Cannot Properly Encrypt Keys Without Access User 39s Master 4 Breac ,

© 2025 Vimarsana