Thursday, January 30, 2025
HomeSecurity NewsSecurity Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group...

Security Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group Chats

Published on

SIEM as a Service

Follow Us on Google News

End-to-end encryption is the major security feature of secure instant messengers, among the most popular one is WhatsApp having more than one billion users.

Security researchers discovered vulnerabilities with Whatsapp and Signal which allows an attacker to add themselves to the group chat. But the risk associated with the attack is limited.

Researchers say that “if anyone that control over the WhatsApp’s servers could add new users to the WhatsApp group without the administrator permission“, it also affect signal and Threema but the impact is less.

Also Read Ransomware Attack Response and Mitigation Checklist

Centralized Messaging Servers

Security Instant messaging apps should satisfy general security goals and the group messages also should have the same measures.

Security researchers said the confidentiality is broken as soon as the uninvited member can obtain all the new messages and read them,” says Paul Rösler, one of the Ruhr University researchers who co-authored a paper on the group messaging vulnerabilities. Reported Wired.

Instant Security messengers use centralized authentication and all the messages transferred through a central server that receives catches and forwards messages.

Vulnerability Impact – WhatsApp flaw

Researchers say both the Whatsapp and Signal failed to Authenticate group messages, the Vulnerability allows an attacker who controls the WhatsApp server or breaks into Transport layer can get full control over a group.

With Signal everyone in the group is an administrator every one in the group can add new users “Researchers discovered the signal management doesn’t check that you are the member of the group before adding a new user”.
In WhatsApp only the administrator authorized to add users and to management messages and it is no signed by administrators, “so the malicious WhatsApp server or if the attacker has control over WhatsApp server can add new users”.

Fix Suggested by researchers

The signal could reach Traceable Delivery by treating receipt messages like content messages and thus end-to-end encrypt them.

Researchers suggested WhatsApp for providing Traceable Delivery by signing the messages with the administrator’s group signature key.

In Threema there is already a message ID appended to every message, this ID only needs to be cryptographically bound to the message.

Researchers Concluded, “We fill this gap by providing a security model and a methodology for analyzing group instant messaging protocols“.

While our investigation focuses on three major instant messaging applications, our methodology, and the underlying model is of generic purpose and can be applied to other secure groups instant messaging protocols as well.

Researchers from Ruhr University Bochum in Germany published the paper in at the At the Real World Crypto security conference.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident

Microsoft has introduced "Administrator Protection" (AP), a sophisticated security feature aimed at elevating Windows...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...