{"id":2206572,"date":"2024-09-25T12:26:18","date_gmt":"2024-09-25T03:26:18","guid":{"rendered":"https:\/\/koreapro.org\/?p=2206572"},"modified":"2024-09-26T16:27:10","modified_gmt":"2024-09-26T07:27:10","slug":"south-koreas-ubiquitous-messaging-apps-security-gaps-risk-millions-of-users","status":"publish","type":"post","link":"https:\/\/koreapro.org\/2024\/09\/south-koreas-ubiquitous-messaging-apps-security-gaps-risk-millions-of-users\/","title":{"rendered":"South Korea\u2019s ubiquitous messaging app\u2019s security gaps risk millions of users"},"content":{"rendered":"
Millions of South Koreans rely on KakaoTalk \u2014 the country\u2019s most popular and ubiquitous messaging app \u2014 for everything from chatting with friends and family to accessing essential services. However, new research has exposed longstanding business practices that could heighten the app\u2019s vulnerabilities.<\/span><\/p>\n These reported vulnerabilities potentially allow attackers \u2014 as well as Kakao \u2014 to access users\u2019 supposedly encrypted chats, reawakening past concerns about the privacy of KakaoTalk users\u2019 personal communications.<\/span><\/p>\n These issues follow other controversies in recent years about personal data breaches from Kakao\u2019s varied services, ranging from criminals selling <\/span>stolen user information<\/span><\/a> in underground markets to payment data being <\/span>handed over<\/span><\/a> to Alipay, a Chinese e-payment service company.<\/span><\/p>\n The complex code base supporting the South Korean technology giant\u2019s interlinked services makes it all the more difficult to fix these <\/span>issues<\/span><\/a>, but the new research also highlights gaps in Kakao\u2019s approach to engaging the global security community.<\/span><\/p>\n Unlike other global technology companies, Kakao only allows South Korean nationals to benefit from its bug bounty program, an initiative that rewards ethical hackers who uncover vulnerabilities in exchange for rewards.<\/span><\/p>\n Many companies operate similar programs to improve their security and protect users from malicious actors, but Kakao\u2019s aversion to rewarding foreign security researchers could limit the effectiveness of its bug bounty scheme.<\/span><\/p>\n EXPOSING VULNERABILITIES<\/b><\/p>\n KakaoTalk introduced its <\/span>Secret Chat<\/span><\/a> function using end-to-end encryption following the Sewol ferry disaster in 2014 after <\/span>controversy<\/span><\/a> erupted over then-President Park Geun-hye\u2019s administration accessing South Korean users\u2019 private chat messages to target critics.<\/span><\/p>\n Following the Sewol incident, Park <\/span>announced<\/span><\/a> that the government would investigate any insults directed against her on social media, including <\/span>private messages<\/span><\/a> sent through KakaoTalk.<\/span><\/p>\n After outraged South Koreans decided to boycott the country\u2019s most popular chat app over the government\u2019s access to their private messages, Kakao <\/span>pledged<\/span><\/a> to reject government requests for user data and hastily <\/span>introduced<\/span><\/a> Secret Chat as well as an option to decline chat invites.<\/span><\/p>\n The new update was built directly on top of Kakao\u2019s existing LOCO protocol, the underlying program <\/span>introduced<\/span><\/a> in 2011 to improve KakaoTalk transmission speeds, but restricted end-to-end encryption to the opt-in Secret Chat rather than rolling it out to all messaging options.<\/span><\/p>\n