FakesApp: A Vulnerability in WhatsApp

rtSFaHPA0C4/default.jpg

Check Point Research shows new vulnerabilities in the popular messaging application that could allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.
Our researchers observed three possible methods of attack exploiting this vulnerability:
1. Use the 'quote' feature in a group conversation to change the identity of the sender, even if that person is not a member of the group.
2. Alter the text of someone else's reply, essentially putting words in their mouth.
3. Send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it's visible to everyone in the conversation.

Following the process of Responsible Disclosure, Check Point Research informed WhatsApp of their findings. In response, WhatsApp acknowledged the vulnerabilities, explained them as being part of the design framework and are open to being approached for further explanation. From Check Point Research's view, we believe these vulnerabilities to be of the utmost importance and require attention.

For full technical analysis, please visit Check Point Research

rtSFaHPA0C4/default.jpg
FakesApp: A Vulnerability in WhatsApp FakesApp: A Vulnerability in WhatsApp Reviewed by Dump3R H3id3gg3R on August 08, 2018 Rating: 5