22 May 2019 - {{hitsCtrl.values.hits}}
On May 13, 2019, Facebook revealed that an ‘advanced cyber actor’ has been spying on some users of its ridiculously popular WhatsApp messaging app, thanks to zero-day vulnerability that allowed hackers to install spyware, silently, just by calling a victim’s phone.
The vulnerability is now fixed, which means that if you’re one of WhatsApp’s 1,500,000,000 users, you need to go to the well and drink up the latest version.
There’s a good chance your app’s already updated itself, but this is a severe vulnerability, so we advise you to check all the same. WhatsApp isn’t exactly shouting about this. The Facebook Security page, WhatsApp’s company website and WhatsApp’s Twitter feed are bereft of information.
The ‘What’s New’ sections of the app’s Google Play and Apple App Store listings would love you to know that with the latest version of the app you can now see stickers in full size when you long press a notification but couldn’t find room for this is the only version that doesn’t allow remote spying.
Instead, Facebook has done the digital equivalent of pinning a security advisory for CVE-2019-3568 to the back of the toilet door in an unlit basement while nobody was looking. It reads as follows:
“Description: A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number.
Affected Versions: The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.”
What the description is trying to tell you is that some people who knew about this vulnerability used phone calls to vulnerable devices to install spyware that could listen in on calls, read messages and switch on the camera. The Telegraph reports that a ‘select number’ of users were affected and have linked the WhatsApp-installed spyware to NSO Group - the company behind the notorious spyware-sold-to-governments known as Pegasus. That description makes the incident sound like an attack against specific individuals rather than an indiscriminate attempt to spy on as many WhatsApp users as possible.
But that doesn’t stop other people abusing the vulnerability in different ways, so you should still update, even if you think you’re unlikely to have been affected by this attack.
How to update WhatsApp
iOS: Go to App Store > Updates. If WhatsApp has automatically updated it will say ’Open’ next to it, so you don’t need to update it. If it says ’Update’, go ahead and tap that to install the latest version (2.19.51). If you want to check the current version number, go to Settings > Help within the app itself.
Android: Go to the Google Play Store > My Apps & Games on the menu. If WhatsApp has automatically updated it will say ’Open’ next to it, so you don’t need to update it. If it says ’Update’, go ahead and tap that to install the latest version (2.19.134). If you want to check the current version number, go to Settings > Help > App Info in the app itself.
25 Dec 2024 3 hours ago
25 Dec 2024 3 hours ago
25 Dec 2024 3 hours ago