Thursday, January 30, 2025
HomeTHREATSWhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to...

WhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to Take over Hundreds of Millions of Accounts

Published on

SIEM as a Service

Follow Us on Google News

Checkpoint Researchers Compromised Both Whatsup & Telegram chat applications which served by End-to -End Encryption.Both application designed with strong encryption that won’t allow to read anyone except the people who communicate originally.

Checkpoint Proved that the same mechanism has also been the origin of the new critical Vulnerability that allow to take over the entire chat conversation of the Victim for both online platform – “WhatsApp Web and Telegram Web” .

Checkpoint Researcher said ,

This vulnerability, if exploited, would have allowed attackers to completely take over users’ accounts on any browser, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more. This means that attackers could potentially download your photos and or post them online, send messages on your behalf, demand ransom, and even take over your friends’ accounts.

Image source :Checkpoint

How Vulnerability Take over the Victim’s chat

Main Attack Vector of this vulnerability exploit  with attacker send the malicious innocent file to the Victim. the file forcing Victims to open it .

Researcher’s said ,The malicious file allows the attacker to access WhatsApp’s and Telegram’s local storage, where user data is stored. From that point, the attacker can gain full access to the user’s account and account data.

“The attacker can then send the malicious file to the all victim’s contacts, opening a dangerous door to a potentially widespread attack over the WhatsApp and Telegram networks.”

Whatsup Account Take over Demo

Telegram Account Take over Demo

Whatsup and Telegram blindly Left to Prevent the Malicious content for being send without Validated was the Main Reason for this Vulnerability Exist , Checkpoint said .

March 7th. Check Point disclosed this information to WhatsApp’s and Telegram’s security teams on  Both companies have verified and acknowledged the security issue and developed a fix for web clients worldwide.

Check Point Security Tips

While WhatsApp & Telegram have patched this vulnerability, as a general practice we recommend the following preventive measures:

  1. Periodically clean logged-in computers from your WhatsApp & Telegram. This will allow you to control the devices that are hosting your account, and shut down unwanted activity.
  2. Avoid opening suspicious files and links from unknown users.

View For More Technical Details : Check point Blog

Also Read :

 
 

 

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in...