WhatsApp exploit allowed spyware to be installed via voice call
地区:
  类型:
  时间:2024-09-22 01:58:17
剧情简介

A WhatsApp vulnerability allowed attackers to remotely install spyware onto phones -- by simply calling them.

First reported by the Financial Timesand confirmed by WhatsApp, the issue was discovered in early May and was promptly fixed by the company.

The Facebook-owned messaging service said it believed certain users were targeted through the vulnerability by an advanced cyber actor.

As noted by the Financial Times, the spyware was developed by the Israeli cyber intelligence firm NSO Group. The malicious code could be inserted via a voice call, even if the recipient didn't answer their phone, and the call would disappear from logs.

SEE ALSO:WhatsApp has become a haven for Nazi propaganda in Germany: report

In a statement, WhatsApp did not name the NSO Group, but said the attack was representative of a private company which works with governments to create spyware for mobile devices.

The messaging company said it has briefed human rights organisations on the finding, and notified U.S. law enforcement to help them conduct an investigation.

WhatsApp said it made changes to its infrastructure last week to prevent the attack from happening, and issued an update for its app.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

"WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices," a WhatsApp spokesperson said in a statement.

"We are constantly working alongside industry partners to provide the latest security enhancements to help protect our users."

The NSO Group is behind a spyware product called Pegasus, which allows operators to take control of a target's phone, allowing them to switch on a phone's camera and a microphone, as well as retrieve private data.

A spokesperson for NSO told Mashable it was investigating the WhatsApp issue.

“NSO’s technology is licensed to authorized government agencies for the sole purpose of fighting crime and terror. The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system," the statement read.

"Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies," it continued. "NSO would not or could not use its technology in its own right to target any person or organization."

Human rights organisation Amnesty International is behind legal action to revoke the NSO Group's export licence in Israel, after an Amnesty staff member was targeted last August by Pegasus.

"NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics. The attack on Amnesty International was the final straw," Danna Ingleton, deputy director of Amnesty Tech, said in a statement.


Featured Video For You
AI won’t see you if you hold this color printout. So steer clear of any and all self-driving vehicles

TopicsCybersecurityWhatsApp

74次播放
34794人已点赞
7人已收藏
明星主演
邰正宵
元若蓝
白歆惠
最新评论(543+)

秋红乐队

发表于5分钟前

回复 谢丹 :


詹采妮

发表于1分钟前

回复 洪卓立 :


徐仲薇

发表于7分钟前

回复 吉杰 :


猜你喜欢
WhatsApp exploit allowed spyware to be installed via voice call
热度
1
点赞

友情链接: