Draft:Dhiraj Mishra (Security Researcher)
Submission declined on 3 November 2024 by Jannatulbaqi (talk). This submission's references do not show that the subject qualifies for a Wikipedia article—that is, they do not show significant coverage (not just passing mentions) about the subject in published, reliable, secondary sources that are independent of the subject (see the guidelines on the notability of people). Before any resubmission, additional references meeting these criteria should be added (see technical help and learn about mistakes to avoid when addressing this issue). If no additional references exist, the subject is not suitable for Wikipedia. This draft's references do not show that the subject qualifies for a Wikipedia article. In summary, the draft needs multiple published sources that are:
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
Dhiraj Mishra is an Indian security researcher and white hat hacker known for discovering significant vulnerabilities in major messaging platforms and his contributions to cybersecurity research.[1] He has presented his security research at prominent cybersecurity conferences including Black Hat USA and BruCon.[2][3] He gained international recognition for identifying critical privacy and security issues in Telegram[4] and his research on malware detection techniques.[5] His discoveries have helped improve privacy features in widely-used messaging applications, particularly focusing on data persistence and deletion vulnerabilities.[6]
Notable Security Research
[edit]SUPRA Smart TV Vulnerability (2019)
[edit]In 2019, Mishra discovered a significant vulnerability in SUPRA Smart Cloud TV systems that allowed attackers on the same Wi-Fi network to hijack TV sets and broadcast unauthorized content, including potentially malicious emergency broadcast messages.[7]
Telegram Vulnerabilities
[edit]MacOS Self-Destructing Messages (2021)
[edit]In February 2021, Mishra discovered a significant vulnerability in Telegram's macOS client where self-destructing messages were not being properly deleted from the system.[8] The bug affected both sent and received conversations that were meant to be automatically deleted, compromising user privacy expectations.[9] Telegram acknowledged and subsequently fixed the vulnerability.[10]
Unsent Media Persistence (2019)
[edit]In September 2019, Mishra identified another privacy concern in Telegram where "unsent" photos and videos remained stored on recipients' devices despite being deleted by the sender.[11] This discovery highlighted important implications for user privacy and data persistence in messaging applications.[12]
SVG Smuggling Research
[edit]In March 2024, Mishra advanced the field of malware detection by developing a new variant of SVG smuggling technique.[13] His research revealed how this technique was being exploited in emerging malware campaigns, contributing to the cybersecurity community's understanding of contemporary threats.
Speaking Engagements
[edit]Mishra has presented security research at major international cybersecurity conferences:
- Black Hat USA 2022 – "Deep Dive into Fuzzing" training[14]
- BruCon 2021 – "Deep Dive into Fuzzing" training[15]
Recognition and Awards
[edit]- Received €3,000 reward from Telegram for identifying privacy vulnerabilities (2021)[16]
See also
[edit]References
[edit]- ^ "Indian cybersecurity researcher rewarded by Telegram", www.uniindia.com, 13 February 2021
- ^ "Deep Dive into Fuzzing", Black Hat USA, 2022
- ^ "Deep Dive into Fuzzing", BruCon, 2021
- ^ Doffman, Zak (13 February 2021), "Why You Should Never Quit WhatsApp For Telegram", www.forbes.com
- ^ Cofense (13 March 2024), "SVG Files Abused in Emerging Campaigns", cofense.com
- ^ Whittaker, Zack (9 September 2019), "Telegram fixes bug that failed to delete 'unsent' photos and videos", techcrunch.com
- ^ Spring, Tom (3 June 2019), "Smart TV Flaws Open Door to Rogue Broadcasts", Threatpost
- ^ Doffman, Zak (13 February 2021), "Why You Should Never Quit WhatsApp For Telegram", www.forbes.com
- ^ Abrams, Lawrence (15 February 2021), "Telegram privacy feature failed to delete self-destructing video files", www.bleepingcomputer.com
- ^ "Telegrams "selbstzerstörende Nachrichten" löschten keine Videos", www.derstandard.at, 14 February 2021
- ^ Whittaker, Zack (9 September 2019), "Telegram fixes bug that failed to delete 'unsent' photos and videos", techcrunch.com
- ^ Mehta, Ivan (10 September 2019), "Telegram fixed a bug that stored images on recipients' phones even after you 'unsent' them", thenextweb.com
- ^ Cofense (13 March 2024), "SVG Files Abused in Emerging Campaigns", cofense.com
- ^ "Deep Dive into Fuzzing", Black Hat USA, 2022
- ^ "Deep Dive into Fuzzing", BruCon, 2021
- ^ Tikhaya, Zlata (13 February 2021), "Un analyste reçoit une récompense de 3.000 euros pour avoir signalé un bug de Telegram", www.fr.sputniknews.com.com
External links
[edit]- Dhiraj Mishra on X
- inputzero – Personal blog and security research