Featured
WhatsApp can be crashed by a group message
Research by Check Point has identified a flaw that would allow a malicious group message to crash WhatsApp on users’ devices
Share
- Click to share on Twitter (Opens in new window)
- Click to share on Facebook (Opens in new window)
- Click to share on LinkedIn (Opens in new window)
- Click to email a link to a friend (Opens in new window)
- Click to share on Reddit (Opens in new window)
- Click to share on WhatsApp (Opens in new window)
- Click to share on Pinterest (Opens in new window)
A new vulnerability in WhatsApp could have allowed a malicious group chat message to crash the app for all members of the group. It came to light through work by Check Point Research, the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cyber security solutions globally.
To regain use of WhatsApp, users would need to uninstall and reinstall it, then delete the group which contains the message.
To create the malicious message, a “bad actor” would need to be a member of the target group – WhatsApp allows up to 256 users per group. From there, the bad actor would need to use WhatsApp Web and their web browser’s debugging tool to edit specific message parameters and send the edited text to the group. This edited message would cause a crash loop for group members, denying users access to all WhatsApp functions until they reinstall WhatsApp and delete the group with the malicious message.
Oded Vanunu, Check Point’s Head of Product Vulnerability Research said: “Because WhatsApp is one of the world’s leading communication channels for consumers, businesses and government agencies, the ability to stop people using WhatsApp and delete valuable information from group chats is a powerful weapon for bad actors. All WhatsApp users should update to the latest version of the app to protect themselves against this possible attack.”
Check Point Research disclosed its findings to the WhatsApp bug bounty program on 28 August 2019. WhatsApp acknowledged the findings and developed a fix to resolve the issue, which is available since WhatsApp version 2.19.58. Users should manually apply on their devices.
“WhatsApp responded quickly and responsibly to deploy the mitigation against exploitation of this vulnerability,” said Vanunu.
WhatsApp Software Engineer Ehren Kret responded: “WhatsApp greatly values the work of the technology community to help us maintain strong security for our users globally. Thanks to the responsible submission from Check Point to our bug bounty program, we quickly resolved this issue for all WhatsApp apps in mid-September. We have also recently added new controls to prevent people from being added to unwanted groups to avoid communication with untrusted parties all together.”
The Check Point Research team found the vulnerability by inspecting the communications between WhatsApp and WhatsApp Web, the web version of the app which mirrors all messages sent and received from the user’s phone. This enabled researchers to see the parameters used for WhatsApp communications and manipulate them. This new research builds on the ‘FakesApp’ flaws discovered by Check Point Research, which allowed group chat messages to be edited to spread fake news.
WhatsApp has 1.5 billion users and more than a billion groups, making it the most popular instant messaging app worldwide. Over 65-billion messages are sent via WhatsApp per day.
* Watch the demo video of how the attack works, and read the full technical details in its research report here.
Share
- Click to share on Twitter (Opens in new window)
- Click to share on Facebook (Opens in new window)
- Click to share on LinkedIn (Opens in new window)
- Click to email a link to a friend (Opens in new window)
- Click to share on Reddit (Opens in new window)
- Click to share on WhatsApp (Opens in new window)
- Click to share on Pinterest (Opens in new window)
Thank you for Signing Up |