Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
One call on WhatsApp is enough to establish surveillance
#1
Exclamation 
Quote:
[Image: whatsapp-encryption-issues.jpg]

A recently discovered zero-day vulnerability in the world’s most popular messenger — WhatsApp — allowed hackers to eavesdrop on users, read their encrypted chats, turn on the microphone and camera, and install spyware that allows even further surveillance, such as browsing through the victim’s photos and videos, accessing their contact list, and so on. What’s even worse, to exploit the vulnerability, all the hacker needs to do is call the victim on WhatsApp.

What is known about the new WhatsApp vulnerability

Reliable information about the situation is in somewhat short supply at this point. What is known is that a specially crafted call can trigger a buffer overflow in WhatsApp, allowing hackers to take control of the application and execute arbitrary code in it. It seems the attackers used that method not only to snoop on users’ chats and calls, but also to exploit previously unknown vulnerabilities in the operating system, which allowed them to install applications on the device. And that’s what they did, installing a spyware app.

According to Facebook, which is the owner of WhatsApp, the vulnerability is now patched. It affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15. That means only the very latest versions of the app are currently safe to use; the vulnerability was patched just a couple of days ago.

Attempts to exploit this vulnerability have already been spotted in the wild. WhatsApp’s security team had implemented some changes on the back end that allowed them to block attacks that relied on the vulnerability, but how many people were spied on and who they were have still not been disclosed.

It is also not yet fully clear which spyware app exactly was being installed in the second stage of attack, but some parties suspect that might be Pegasus, the spyware famous for its supremely flexible infection capabilities.

It’s worth mentioning that such vulnerabilities are hard to exploit and that Pegasus (assuming it was Pegasus) is expensive malware used mostly by state-sponsored actors. That means that if you’re of no interest to such high-profile spies, you’re probably safe. However there’s always a chance that the spying tools might be leaked and used by other actors, so it’s wise to protect yourself.
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
FastCopy 5.7.7
FastCopy 5.7.7: ...harlan4096 — 05:45
Brave 1.65.126
Release Channel 1....harlan4096 — 05:43
AMD Confirms RDNA 3+ GPU Architecture F...
AMD reaffirms Zen5-b...harlan4096 — 05:42
Microsoft confirms it can't fix KB503444...
Microsoft has offi...harlan4096 — 05:41
360 Total Security 11.0.0.1099
 11.0.0.1099 Apr 2...harlan4096 — 09:42

[-]
Birthdays
Today's Birthdays
avatar (43)centfootadoni
Upcoming Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
avatar (36)owysykan
avatar (47)beautgok
avatar (37)axuben
avatar (43)talsmanthago
avatar (29)mocetor
avatar (44)piomaibhaict
avatar (49)kingbfef
avatar (36)izenesiq
avatar (38)ihijudu
avatar (43)tiojusop
avatar (40)Damiennug
avatar (38)acoraxe
avatar (47)contjrat
avatar (39)axylisyb
avatar (42)tukrublape
avatar (39)iruqi
avatar (40)saitetib
avatar (34)ypasodiny
avatar (37)omapek
avatar (46)Geraldtuh
avatar (42)knigiJow
avatar (44)1stOnecal
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (43)xclubDum
avatar (39)Stewartanilm
avatar (42)nikitaxople
avatar (38)GregoryRog
avatar (43)mediumog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
mjcn19's profile mjcn19

>