Saturday, June 22, 2024

New WhatsApp Vulnerability Allows Hackers to Intercept and Change Message Contents

A new WhatsApp vulnerability could allow attackers to spread fake news appeared to be sent from the trusted contacts.

WhatsApp is a most popular instant messaging app used by more than 1.5 billion users, it has been heavily targetted by scammers for spreading fake news. WhatsApp recently rolled out a new feature which indicates to user’s that the message they have received is the forwarded one.

Checkpoint researchers found a new WhatsApp vulnerability that allows an attacker that allows an attacker to intercept and change the messages that sent in both the private and group conversations.

Researchers managed to reverse the WhatsApp communication to see the parameters that sent between the mobile and the web version to manipulate the data.

WhatsApp vulnerability – Attack Methods

Three possible methods observed in exploiting this vulnerability. Researchers published a Burp Suite Extension to manipulate the three possible methods.

Attack 1: Change the Identity of a Sender in a Group Chat, Even If They Are Not a Member of the Group

With this method, attackers can spoof the reply message to mimic as another group member or the member, not in the group. All attackers need is to catch the encrypted traffic and use the Burp Extension to decrypt it.

To send a spoofed message the attacker needs to reply to the message he spoofed by quoting and changing that message to everyone in the group. The participant can be anyone, even not a member of that group. You can find the technical analysis details in checkpoint’s blog post.

Attack 2: Changing a Correspondent’s Reply To Put Words in Their Mouth

With this attack the attacker able to manipulate himself as the message comes from some other person, all he needs is to manipulate the fromMe parameter in a message which indicates who sent the message.

Attack 3: Send a Private Message in a Chat Group But When The Recipient Replies, The Whole Group Sees It.

The third attack method shows that it is possible to send a private message to a selected individual in the group chat, and if he replies it will be visible to everyone.

“Check Point Research informed WhatsApp of their findings. From Check Point Research’s view, we believe these vulnerabilities to be of the utmost importance and require attention.”

WhatsApp today rolled out a forward message feature which restricts the forwarding message capabilities to just 5 chats in one go.

Also Read

Security Flaws Identified in WhatsApp Could Allow Attackers to Spy on Group Chats

OMG: Fake WhatsApp Android App Downloaded Over 1 Million People’s

Whatsapp Blocked In China After Google And Facebook

Website

Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles