Security Vulnerability Assessment on Threads Application through Digital Forensics Analysis

Authors

DOI:

https://doi.org/10.34190/eccws.24.1.3602

Keywords:

Social Network Application Security and Privacy, Security Vulnerability Assessment, Social Media Forensics, Digital Forensics, Threads Application, Social Media Security, Social Media Privacy

Abstract

The rapid emergence of new social media applications has introduced fresh vectors for cybercrime, highlighting the need for timely security vulnerability assessments. This paper presents a comprehensive security vulnerability assessment of Threads, a newly emerging social networking application, by examining its behaviour and data handling through a digital forensic analysis. The study followed a structured experiment which involved installing the the Universal Windows Platform (UWP) applications for Instagram and Threads on a Windows 11 device, conducting typical user activities between two test accounts, acquiring forensic disk images and memory dumps, capturing network traffic, followed by a digital forensic analysis of the discovered artifacts. The primary motivation behind this analysis is to uncover potential security vulnerabilities of the application through a forensic examination of data remnants left by the application. Data acquisition and analysis were carried out using tools such as FTK Imager, Autopsy, Belkasoft Evidence Center, Volatility 3 and Wireshark. The study revealed a range of security and privacy concerns related to the application’s data storage, memory usage, and network utilization. For instance, user-generated content and application metadata were found in application files without adequate encryption and sensitive user credentials were discovered, in plaintext. Additionally, insecure handling of backend communications and permissive CORS configurations were observed, introducing risks such as session hijacking and Cross-Site Scripting (XSS) vulnerabilities. Findings of this research underscore the need for improved security mechanisms in modern social media applications. This study provides valuable insights for developers, cybersecurity professionals, and digital forensic investigators to strengthen the security posture of current social networking applications.

Author Biographies

Wadduwage Shanika Perera, Sam Houston State University, Huntsville, Texas, USA

Shanika Perera is a doctoral student pursuing a Ph.D. in Digital and Cyber Forensic Science at Sam Houston State University in Huntsville, Texas, USA. She holds a Bachelor of Science degree in Computer Studies from the University of Kelaniya, Sri Lanka, and a Master of Science degree in Computing and Data Science from Sam Houston State University. Her research focuses on AI security, specifically exploring methods to protect AI systems from emerging threats.

Ahsan Islam, Sam Houston State University, Huntsville, Texas, USA

Ahsan Islam is a doctoral student pursuing a Ph.D. in Digital and Cyber Forensic Science at Sam Houston State University in Huntsville, Texas, USA. He earned his bachelor's degree in Electrical and Electronics Engineering from the American International University-Bangladesh, followed by a master's degree in Computing and Data Science from Sam Houston State University, Texas, USA.

Cihan Varol, Sam Houston State University, Huntsville, Texas, USA

Dr. Cihan Varol is a Professor at the Department of Computer Science, Sam Houston State University, Huntsville, Texas, USA. He received his Bachelor of Science degree in Computer Science from Firat University, Elazig, Turkey in 2002, Master of Science degree from Lane Department of Computer Science and Electrical Engineering from West Virginia University, Morgantown, WV, USA in 2005, and Doctor of Philosophy in Applied Computing from University of Arkansas at Little Rock in 2009. His studies have led to more than 80 peer-reviewed journal and conference publications and two book chapters. 

Downloads

Published

2025-06-25