F-Secure researcher helps improve integrity of Ellume COVID-19 home test - The EE

F-Secure researcher helps improve integrity of Ellume COVID-19 home test

Alan Fox of Ellume

Helsinki, Finland. 21 December 2021 – A researcher with cyber security provider F-Secure has found and helped fix design flaws in Ellume‘s COVID-19 Home Test. The flaws would have allowed an individual to falsify a certifiable result in Ellume’s test, which has received emergency use authorisation in the US.

Ellume’s COVID-19 Home Test is a self-administered antigen test that individuals can use to check to see if they have COVID-19. Instead of submitting a sample to a testing facility, users collect a nasal sample on their own using the test kit’s equipment, then test the sample using the included Bluetooth analyser. The analyser then reports the result to the user and health authorities via Ellume’s Android or iOS app.

It was the Bluetooth analyser that caught the interest of security consultant Ken Gannon, who specialises in mobile security. He discovered it was possible to change results after the Bluetooth analyser performed the test but before they’re reported by the app.

Furthermore, Gannon and a colleague were able to obtain a proof of observation certificate for a changed result from the third-party video observation service they were directed to by Ellume’s website. Ellume describes observed testing to verify the identity of the test subject as a requirement for some activities, including entry to the U.S.*

“Our research involved changing a negative test result to positive, but the process works both ways. Prior to Ellume’s fixes, highly skilled individuals or organisations with cyber security expertise trying to circumvent public health measures meant to curb COVID’s spread, could’ve done so by replicating our findings,” explains Gannon. “Someone with the proper motivation and technical skills could’ve used these flaws to ensure they, or someone they’re working with, gets a negative result every time they’re tested.”

Gannon shared his findings with Ellume, who promptly investigated and confirmed the problem and implemented several improvements to prevent tampering with the test results.

“Ellume has updated our system to detect and prevent the transmission of falsified results. In addition, we have analysed all results to-date and confirmed no other results were impacted. We will also deliver a verification portal to allow authorities including health departments, employers, schools, event organisers and others to verify the authenticity of the Ellume COVID-19 Home Test,” says, Alan Fox, head of information systems, Ellume.

“Our test is already one of the most secure on the market and thanks to F-Secure’s insights, our ECHT is now even more secure particularly compared to currently available non-digital tests, which can be easily falsified simply by putting soda or water on the test without requiring any specialised skills. Ellume is confident in the reliability of our ECHT test result, and we would like to thank F-Secure for bringing this issue to our attention and for the work they do every day to protect consumers, businesses and organisations around the globe,” continues Fox.

While Gannon was compelled to investigate Ellume’s test out of professional curiosity, he points out that other individuals or organisations can take advantage of design flaws in technology in ways that are more harmful.

“When security researchers look for problems in technology, we do it to challenge ourselves and the results are usually able to help other companies make their products safer to use. However, adversaries are also constantly looking for problems in technology that they can use to achieve other objectives. In this case, an adversary could’ve used these design flaws to circumvent public health measures intended to fight the COVID pandemic, so I’m happy that I was able to help Ellume improve the integrity of their tests,” explains Gannon.

A write-up of Gannon’s research is available on F-Secure Labs here.

Follow us and Comment on Twitter @TheEE_io

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.