Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

WhatsApp Privacy Flaw Devices Information to Any Other User

admin by admin
Jan 23, 2024
in News
A A
0

Hackers seek to exploit WhatsApp flaws to gain unauthorized access to user data, messages, and sensitive information. 

Exploiting these flaws allows threat actors to compromise user privacy, conduct espionage, and engage in malicious activities.

Recently, a cybersecurity analyst, Tal Be’ery, discovered a WhatsApp privacy flaw that devices information on any other user.

Document

Free Webinar

Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.


WhatsApp Privacy Flaw

For message confidentiality, WhatsApp, with over 5 billion downloads and 2.4 billion active users, relies on the End-to-End Encryption (E2EE) protocol.

WhatsApp introduced E2EE in 2016, where each app generates a unique crypto key for secure messaging. This key is tied to the device that changes during reinstallation to notify other users that a device switch has occurred.

Encryption verification (Source - Medium)
Encryption verification (Source – Medium)

WhatsApp prevents information leaks during app reinstallation by maintaining the same key if restored from backup. In 2021, with multi-device architecture, companion devices generate their keys known as ‘Identity keys,’ valid until the app is uninstalled.

The sender creates session keys for each device based on its Identity Key when sending a message to a multi-device recipient. 

End-to-end encrypted channels (Source - Medium)
End-to-end encrypted channels (Source – Medium)

Using client-fanout, each message is encrypted for all devices, which requires the sender to know and be aware of all receiver devices by including the distinction between primary and companion devices.

Threat actors can access WhatsApp users’ device info by exploiting the WhatsApp web client that stores identity keys in the browser’s local storage. 

Examining the ‘Signal-storage.identity-store’ table reveals user contacts and their keys, which distinguishes the primary devices with a ‘.0’ suffix and companion devices with a ‘:<n>.0’ suffix

Identity store table (Source - Medium)
Identity store table (Source – Medium)

Threat actors using these methods can passively query any WhatsApp user’s device info by monitoring companion devices and identity changes. 

This allows them to choose the ‘path of least resistance’ for attacks to target specific devices and exploit changes in user platforms. Even non-sophisticated attackers can leverage this information to access WhatsApp content.

However, the researcher notified the Meta about this bug and received the following response:-

Reply from Meta (Source - Medium)
Reply from Meta (Source – Medium)

While removing the table is a partial solution, as the core issue lies in fixing the E2EE protocol for true privacy. Introducing a security control to limit the exposure of identity keys to contacts would significantly mitigate this privacy leak without addressing signs.

Try Kelltron’s cost-effective penetration testing services to evaluate digital systems security. Free demo available.

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.