Monday, November 4, 2024
HomeSecurity NewsSecurity Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group...

Security Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group Chats

Published on

Malware protection

End-to-end encryption is the major security feature of secure instant messengers, among the most popular one is WhatsApp having more than one billion users.

Security researchers discovered vulnerabilities with Whatsapp and Signal which allows an attacker to add themselves to the group chat. But the risk associated with the attack is limited.

Researchers say that “if anyone that control over the WhatsApp’s servers could add new users to the WhatsApp group without the administrator permission“, it also affect signal and Threema but the impact is less.

- Advertisement - SIEM as a Service

Also Read Ransomware Attack Response and Mitigation Checklist

Centralized Messaging Servers

Security Instant messaging apps should satisfy general security goals and the group messages also should have the same measures.

Security researchers said the confidentiality is broken as soon as the uninvited member can obtain all the new messages and read them,” says Paul Rösler, one of the Ruhr University researchers who co-authored a paper on the group messaging vulnerabilities. Reported Wired.

Instant Security messengers use centralized authentication and all the messages transferred through a central server that receives catches and forwards messages.

Vulnerability Impact – WhatsApp flaw

Researchers say both the Whatsapp and Signal failed to Authenticate group messages, the Vulnerability allows an attacker who controls the WhatsApp server or breaks into Transport layer can get full control over a group.

With Signal everyone in the group is an administrator every one in the group can add new users “Researchers discovered the signal management doesn’t check that you are the member of the group before adding a new user”.
In WhatsApp only the administrator authorized to add users and to management messages and it is no signed by administrators, “so the malicious WhatsApp server or if the attacker has control over WhatsApp server can add new users”.

Fix Suggested by researchers

The signal could reach Traceable Delivery by treating receipt messages like content messages and thus end-to-end encrypt them.

Researchers suggested WhatsApp for providing Traceable Delivery by signing the messages with the administrator’s group signature key.

In Threema there is already a message ID appended to every message, this ID only needs to be cryptographically bound to the message.

Researchers Concluded, “We fill this gap by providing a security model and a methodology for analyzing group instant messaging protocols“.

While our investigation focuses on three major instant messaging applications, our methodology, and the underlying model is of generic purpose and can be applied to other secure groups instant messaging protocols as well.

Researchers from Ruhr University Bochum in Germany published the paper in at the At the Real World Crypto security conference.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...