WhatsApp exploit allowed spyware to be installed via voice call

WhatsApp exploit allowed spyware to be installed via voice call图片展示

发布时间:2024-09-20 观看次数:72335
  • WhatsApp exploit allowed spyware to be installed via voice call视频展示

    WhatsApp exploit allowed spyware to be installed via voice call详情

    A WhatsApp vulnerability allowed attackers to remotely install spyware onto phones -- by simply calling them.

    First reported by the Financial Timesand confirmed by WhatsApp, the issue was discovered in early May and was promptly fixed by the company.

    The Facebook-owned messaging service said it believed certain users were targeted through the vulnerability by an advanced cyber actor.

    As noted by the Financial Times, the spyware was developed by the Israeli cyber intelligence firm NSO Group. The malicious code could be inserted via a voice call, even if the recipient didn't answer their phone, and the call would disappear from logs.

    SEE ALSO:WhatsApp has become a haven for Nazi propaganda in Germany: report

    In a statement, WhatsApp did not name the NSO Group, but said the attack was representative of a private company which works with governments to create spyware for mobile devices.

    The messaging company said it has briefed human rights organisations on the finding, and notified U.S. law enforcement to help them conduct an investigation.

    WhatsApp said it made changes to its infrastructure last week to prevent the attack from happening, and issued an update for its app.

    Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!

    "WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices," a WhatsApp spokesperson said in a statement.

    "We are constantly working alongside industry partners to provide the latest security enhancements to help protect our users."

    The NSO Group is behind a spyware product called Pegasus, which allows operators to take control of a target's phone, allowing them to switch on a phone's camera and a microphone, as well as retrieve private data.

    A spokesperson for NSO told Mashable it was investigating the WhatsApp issue.

    “NSO’s technology is licensed to authorized government agencies for the sole purpose of fighting crime and terror. The company does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions. We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system," the statement read.

    "Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies," it continued. "NSO would not or could not use its technology in its own right to target any person or organization."

    Human rights organisation Amnesty International is behind legal action to revoke the NSO Group's export licence in Israel, after an Amnesty staff member was targeted last August by Pegasus.

    "NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics. The attack on Amnesty International was the final straw," Danna Ingleton, deputy director of Amnesty Tech, said in a statement.


    Featured Video For You
    AI won’t see you if you hold this color printout. So steer clear of any and all self-driving vehicles

    TopicsCybersecurityWhatsApp

    更多产品中心游戏推荐