{"id":15314,"date":"2019-05-14T10:45:29","date_gmt":"2019-05-14T18:45:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/14\/news-9063\/"},"modified":"2019-05-14T10:45:29","modified_gmt":"2019-05-14T18:45:29","slug":"news-9063","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/14\/news-9063\/","title":{"rendered":"How Hackers Broke WhatsApp With Just a Phone Call"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cdacf5e2c82ec474dc7bbda\/master\/pass\/phonecall-1127496509.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 14 May 2019 16:05:52 +0000<\/strong><\/p>\n<p><span class=\"lede\">You&#x27;ve heard the <\/span>advice a million times. <a href=\"https:\/\/www.wired.com\/story\/resist-phishing-attacks\/\">Don&#x27;t click links<\/a> in suspicious emails or texts. Don&#x27;t <a href=\"https:\/\/www.wired.com\/2016\/12\/never-ever-ever-download-android-apps-outside-google-play\/\">download shady apps<\/a>. But a new <em>Financial Times<\/em> <a href=\"https:\/\/www.ft.com\/content\/4da1117e-756c-11e9-be7d-6d846537acab?\" target=\"_blank\">report<\/a> alleges that the notorious Israeli spy firm NSO Group developed a WhatsApp exploit that could inject malware onto targeted phones\u2014and steal data from them\u2014simply by calling them. The targets didn&#x27;t need to pick up to be infected, and the calls often left no trace on the phone&#x27;s log. But how would a hack like that even work in the first place?<\/p>\n<p>WhatsApp, which offers <a href=\"https:\/\/www.wired.com\/2016\/04\/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people\/\">encrypted messaging by default<\/a> to its 1.5 billion users worldwide, discovered the vulnerability in early May and released a patch for it on Monday. The Facebook-owned company told the <em>FT<\/em> that it contacted a number of human rights groups about the issue and that exploitation of this vulnerability bears &quot;all the hallmarks of a private company known to work with governments to deliver spyware.&quot; In a statement, NSO Group denied any involvement in selecting or targeting victims but not its role in the creation of the hack itself.<\/p>\n<p>&quot;This does indeed sound like a freak incident.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Bjoern Rupp, CryptoPhone<\/p>\n<p class=\"paywall\">So-called zero-day bugs, in which attackers find a vulnerability before the company can patch it, happen on every platform. It&#x27;s part and parcel of software development; the trick is to close those security gaps as quickly as possible. Still, a hack that requires nothing but an incoming phone call seems uniquely challenging\u2014if not impossible\u2014to defend against.<\/p>\n<p class=\"paywall\">WhatsApp wouldn&#x27;t elaborate to WIRED about how it discovered the bug or give specifics on how it works, but the company says it is doing infrastructure upgrades in addition to pushing a patch to ensure that customers can&#x27;t be targeted with other phone-call bugs.<\/p>\n<p class=\"paywall\">&quot;Remote-exploitable bugs can exist in any application that receives data from untrusted sources,&quot; says Karsten Nohl, chief scientist at the German firm Security Research Labs. That includes WhatsApp calls, which use the voice-over-internet protocol to connect users. VoIP applications have to acknowledge incoming calls and notify you about them, even if you don&#x27;t pick up. &quot;The more complex the data parsing, the more room for error,&quot; Nohl says. &quot;In the case of WhatsApp, the protocol for establishing a connection is rather complex, so there is definitely room for exploitable bugs that can be triggered without the other end picking up the call.&quot;<\/p>\n<p class=\"paywall\">VoIP calling services have been around for so long that you&#x27;d think any kinks in the basic call connection protocols would be worked out by now. But in practice, every service&#x27;s implementation is a little bit different. Nohl points out that things get even trickier when you are offering <a href=\"https:\/\/www.wired.com\/2017\/04\/encrypted-chat-took-now-encrypted-callings-turn\/\">end-to-end encrypted calling<\/a>, as WhatsApp famously does. While WhatsApp bases its end-to-end encryption on the Signal Protocol, its VoIP calling functionally likely also includes other proprietary code as well. Signal says that its service is not vulnerable to this calling attack.<\/p>\n<p class=\"paywall\">According to Facebook&#x27;s <a href=\"https:\/\/www.facebook.com\/security\/advisories\/cve-2019-3568\" target=\"_blank\">security advisory<\/a>, the WhatsApp vulnerability stemmed from an extremely common type of bug known as a buffer overflow. Apps have a sort of holding pen, called a buffer, to stash extra data. A popular class of attacks strategically overburdens that buffer so the data &quot;overflows&quot; into other parts of the memory. This can cause crashes or, in some cases, give attackers a foothold to gain more and more control. That&#x27;s what happened with WhatsApp. The hack exploits the fact that in a VoIP call the system has to be primed for a range of possible inputs from the user: pick up, decline the call, and so on.<\/p>\n<p class=\"paywall\">&quot;This does indeed sound like a freak incident, but at the heart of it seems to be a buffer overflow problem that is unfortunately not too uncommon these days,&quot; says Bjoern Rupp, CEO of the German secure communication firm CryptoPhone. &quot;Security never was WhatsApp&#x27;s primary design objective, which means WhatsApp has to rely on complex VoIP stacks that are known for having vulnerabilities.&quot;<\/p>\n<p class=\"paywall\">The WhatsApp bug was being exploited to target only a small number of high-profile activists and political dissidents, so most people won&#x27;t have been affected by any of this in practice. But you should still download the patch on your <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.whatsapp&amp;hl=en_US\" target=\"_blank\">Android<\/a> and <a href=\"https:\/\/itunes.apple.com\/us\/app\/whatsapp-messenger\/id310633997?mt=8\" target=\"_blank\">iOS<\/a> devices.<\/p>\n<p class=\"paywall\">&quot;Companies like NSO Group try to keep a little stockpile of things that can be used to get onto devices,&quot; says John Scott-Railton, a senior researcher at the University of Toronto&#x27;s Citizen Lab. &quot;This incident makes it abundantly clear that anyone with a phone is impacted by the kind of vulnerabilities that customers of these companies are slinging around. There\u2019s a reality here for all of us.&quot;<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/whatsapp-hack-phone-call-voip-buffer-overflow\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5cdacf5e2c82ec474dc7bbda\/master\/pass\/phonecall-1127496509.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 14 May 2019 16:05:52 +0000<\/strong><\/p>\n<p>All it took to compromise a smartphone was a single phone call over WhatsApp. The user didn&#8217;t even have to pick up the phone.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-15314","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15314"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15314\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}