logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
17th May 2019 by CyberVision 0 Comments 916 Views
17th May 2019 by CyberVision in F-Secure

WhatsApp’s new exploit causes ructions in the instant-messaging world

WhatsApp is a messaging app that most users are familiar with and it allows one to text, chat and share media, including voice messages and videos, with individuals or groups. The app offers encrypted messaging by default to its 1.5 billion users worldwide. Owned and run by Facebook, the company discovered a new vulnerability in early May and have released a patch for it on Monday 13th May 2019. This new WhatsApp exploit injects malware onto targeted phones and steals data from them, simply by calling the victim. The targets do not even have to answer the call to become infected and the calls leave no trace on the phone’s log.

 

Remote-exploitable bugs can exist in any application that receives data from untrusted sources. That includes WhatsApp calls, which use the voice-over-internet protocol (VoIP) to connect users. According to the public statements Facebook has shared, the WhatsApp vulnerability came from an extremely common type of bug known as a buffer overflow. Most apps have a buffer where they store extra data. Hackers are aware of this strategy and they intentionally overburden the buffer, so that the extra data is forced to overflow into other parts of the memory. This then gives attackers leverage to gain more control.

 

Security has never been WhatsApp’s primary design objective, which means WhatsApp must rely on complex VoIP stacks that are known for having vulnerabilities. WhatsApp’s protocols for establishing a connection is rather complex, deeming this application a playground for exploitable bugs and this new bug can be triggered without the other end even picking up the call.

 

WhatsApp has not yet provided information on how they discovered this bug or shared any specifics on how it works. They have expressed though that they’re busy with infrastructure upgrades in addition to implementing a patch to ensure that customers can’t be targeted with other phone-call bugs.

 

Attackers are always trying to find a vulnerability before the owners of the application can patch it. It is an inevitable part of software development, which emphasises the importance of closing security gaps as soon as possible. However, a hack that requires nothing but an incoming phone-call seems very overwhelming to protect yourself from. Make sure to download the updated WhatApp patch on all of your devices.

1
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • camsoftcybersecurity
  • f-secure
  • f-secure cyber security
  • whatsapp exploit
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo