When the hacker can run code in a location that should be secure, they can take malicious steps. This is where an attack deliberately puts too much code into a small buffer so that it "overflows" and writes code into a location it shouldn't be able to access. This worked through a method known as buffer overflow. And the target may not even be aware that malware has been installed on their device. Even if the target didn't answer the call, the attack could still be effective. This scary attack allowed hackers to access a device simply by placing a WhatsApp voice call to their target. To keep yourself safe from this problem, you should update WhatsApp to version 2.19.244 or above.Īnother WhatsApp vulnerability discovered in early 2019 was the Pegasus voice call hack. Fortunately, Awakened disclosed the vulnerability responsibly and Facebook, which owns WhatsApp, patched the issue. The vulnerability affected versions of WhatsApp up to 2.19.230 on Android 8.1 and 9. They could also see users' files, photos, and videos sent through WhatsApp. The hackers would be able to see who the user had been messaging and what they had been saying. If a hacker were to send a malicious GIF to a user, they could compromise the user's entire chat history. This means that code can be hidden within the image. GIF files are special because they have multiple encoded frames. When this happens, the app parses the GIF to show a preview of the file. The hack works by taking advantage of the way that WhatsApp processes images when the user opens the Gallery view to send a media file. In October 2019, security researcher Awakened revealed a vulnerability in WhatsApp that let hackers take control of the app using a GIF image.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |