DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How WhatsApp Allow Hackers to Intercept and Manipulate Your Messages

DigitalCIO Bureau by DigitalCIO Bureau
August 10, 2019
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Researchers revealed that security vulnerabilities in WhatsApp can allow hackers to intercept and manipulate user messages. Read on to know more…

Researchers from Israeli security company Check Point have identified three attack modes in WhatsApp which can be exploited to intercept and manipulate users’ messages. Apparently, these security issues were revealed to WhatsApp last year. However, they remain exploitable even after one year.

Security Issues
The three possible attack modes leverage social engineering tricks to fool users and to spread false information to different WhatsApp groups. These security issues could have various consequences such as the hackers can disguise a private message as a public message and send it to a participant of a group. This causes the ‘private’ response from the targeted individual to be visible to everyone in the conversation.

Hackers can also use the ‘quote’ function of a group conversation to change the identity of the message sender, who is not even a member of the group and attackers can alter someone’s reply or message and add bogus data into it.

As of August 7, WhatsApp has only fixed the first security issue and is believed that attackers can leverage the other two security vulnerabilities to spread online scams, rumors, and fake news.

Latest Investigation
At the recent Black Hat cybersecurity conference 2019 held in Las Vegas, security researchers from CheckPoint reverse-engineered WhatsApp’s web source code to successfully intercept and manipulate private messages. In a presentation titled “Reverse Engineering WhatsApp Encryption for Chat Manipulation and More,” Roman Zaikin, a security researcher, and Oded Vanunu, head of products vulnerability research, both at Check Point, explained the process in detail. Elaborating on the security vulnerabilities in WhatsApp, researchers at Check Point pointed out that they had created a tool to decrypt communications on WhatsApp. When they reversed its algorithm to decrypt the data, they found that the messaging platform was using the protobuf2 protocol for encryption. When they converted the protobuf2 data to JSON (JavaScript Object Notation) — a data interchange format — they saw the secret parameters for the messages which they were able to manipulate.

In an official blog post, the researchers warned that the security vulnerability can be exploited in three ways. First, by spoofing a reply message to put words in someone’s mouth. In this case a hacker can manipulate a chat by sending a reply message to himself so he can modify the content and then send the message back to the group. The second attack can be carried out by changing the identity of a sender in a group chat by using the quote feature even if he is not a member of the group.

Mitigation
“These security bugs are of course dangerous, but they are not uncommon in any type of software. Yet, users should be very careful when contributing to group chats. In case of any doubt during correspondence, confirm the author’s identity in a private chat,” said Victor Chebyshev, security researcher at Kaspersky. He also recommends that users should keep an eye on WhatsApp updates and download new versions immediately to stay secure as many of the updates can be patches for such vulnerabilities.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Arctic Wolf Snaps up UpSight Security

by DigitalCIO Bureau
November 6, 2025
0
CRISIL To Acquire Bridge To India Energy

Security company Arctic Wolf has acquired UpSight Security to enhance its Aurora Endpoint Security solution with AI-driven features for ransomware prevention and rollback recovery. Through the acquisition of UpSight Security,...

Read moreDetails

Vanguard Launches Global Technology Center in Hyderabad

by DigitalCIO Bureau
November 4, 2025
0
Vanguard Launches Global Technology Center in Hyderabad

Vanguard has launched its Global Technology Center in Hyderabad, marking a significant milestone in the firm’s technology transformation. The new office reflects Vanguard’s recognition of India as a...

Read moreDetails

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails
Next Post

The Critical Security Issues in Big Data

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Mimecast Acquires AI Specialist Aware

Mimecast Acquires AI Specialist Aware

August 20, 2024

Athenta Technologies Supports Customers in Leveraging Infrastructure Management Solutions

October 24, 2019
Zendesk Appoints Lila Tretikov to Board of Directors

Zendesk Appoints Lila Tretikov to Board of Directors

August 9, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?