2 min read

WhatsApp security flaw could have hijacked users' computers, just by knowing their phone numbers

Graham CLULEY

September 09, 2015

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
WhatsApp security flaw could have hijacked users' computers, just by knowing their phone numbers

We all know that the WhatsApp messaging service is available for smartphones – there are hundreds of millions of mobile users of the service.

But some people want to have WhatsApp conversations on their desktop computer rather than their smartphone – and that’s why the Facebook-owned service has WhatsApp Web.

From WhatsApp Web you can send and receive messages, images, videos, audio files, even your location and contact cards. All from the comfort of your desktop browser.

So far, so good.

But security researchers at Check Point have discovered a serious vulnerability on the web-based WhatsApp that could be exploited by malicious attackers to infect the computers of users.

According to security researcher Kasif Dekel, all a malicious hacker needs to do is send a boobytrapped contact card (known as a vCard) to their intended victim. Once opened, the malicious code executes and infects the recipient’s PC.

Dekel gave the example of a message claiming to contain the contact details of Hollywood actress Angelina Jolie.

angelina-jolie

In the demonstration, attempting to open the contact card executes code which displays the word “HACKED” in a pop-up message box.

Thankfully, WhatsApp took the problem seriously when it was reported to them in August, and a patched version of WhatsApp was rolled out just six days later. Check Point waited a further 12 days before disclosing the vulnerability publicly, presumably to ensure that as many people as possible had benefited from the secured software.

This, it feels to me, is a responsible way to handle vulnerabilities. A security researcher stumbles across a serious flaw that definitely needs to be fixed – but rather than racing to Twitter to declare how clever he or she is, they instead contact the software manufacturer privately and work with them to get the issue resolved. They then wait until there is a good chance that no-one else will be able to actively exploit the flaw before releasing details and having their moment in the spotlight.

If only more vulnerability researchers worked this way, caring about the internet community as a whole rather than their personal glory.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read