Connect with us

Technology

Inside the New WhatsApp Buffer Overflow Vulnerability

Published

on

Whatsapp

Facebook’s WhatsApp mobile app has had a rough time lately with regard to software vulnerabilities. In November 2019, the social media company quietly issued a security patch for a buffer overflow vulnerability contained in their messaging application.

However, the vulnerability disclosed in November 2019 is not the only recent vulnerability discovered and patched in the secure messaging application. Earlier in 2019, another buffer overflow vulnerability was discovered and patched by the company. Both of these vulnerabilities are rated as “severe” due to the fact that an attacker exploiting them can run malicious code on the target device.

To make things worse, the vulnerabilities in WhatsApp can be exploited by an unauthenticated attacker. These vulnerabilities were discovered in functions that process data sent by another WhatsApp user to the target. By taking a simple action – initiating a WhatsApp call or sending an MP4 video to the target – an attacker can trigger the vulnerability, giving them control over the device. These vulnerabilities can then be exploited to place spyware on the victim’s device and to view the user’s messaging history within the app.

A Brief History of WhatsApp Security

The recent WhatsApp vulnerability is not the first buffer overflow contained within the mobile app. In May 2019, a different buffer overflow vulnerability was discovered in how WhatsApp processed the data contained within an incoming call.

This vulnerability was created because WhatsApp uses a special binary format for sending data between devices and then unpacks this data at the recipient device. If an attacker sent a specially formatted packet, which lied about the length of a certain field, the recipient’s WhatsApp would unpack the data into a place on the stack that did not have sufficient space for it. As a result, the attacker would have the ability to write to memory that should have been outside of their control. This vulnerability was concerning since it allowed remote code execution on a target device without any user interaction required. The malicious packet was sent as part of initiating a call, so, even if the user rejected the call, the damage was already done.

This past WhatsApp vulnerability has been the source of significant controversy. While Facebook was in the process of patching the vulnerability, they observed someone trying to exploit it on the device of a UK-based human rights lawyer. Additional investigation pointed to the use of the vulnerability to spy upon individuals who would be of interest to certain governments.

The Israeli-based NSO Group is well known for developing and selling exploits to governments for use in surveillance activities that fall outside the scope of law enforcement activities. This, and the fact that the observed attack used infrastructure previously linked to the NSO Group, has led Facebook to believe that the company was beyond the exploitation of the WhatsApp vulnerability. As a result, Facebook has begun a lawsuit against the NSO Group for exploitation of a vulnerability in one of their products.

The Newest WhatsApp Vulnerability

The buffer overflow vulnerability disclosed in May was not the last such vulnerability in the WhatsApp platform. In November 2019, Facebook patched another vulnerability in WhatsApp that was similar in scope, severity, and potential impact.

This vulnerability dealt with how WhatsApp handled MP4 video files. Along with a video file comes a stream of metadata containing details about the file. When parsing this metadata, WhatsApp is vulnerable to a stack-based buffer overflow attack. This would allow the attacker to perform a Denial of Service attack (crashing the app) or to run attacker-controlled code on the app that could give access to previous conversations that the user has performed on the app. Exploitation of the vulnerability only requires an attacker to know the phone number of the victim and to send them a malicious MP4 video via WhatsApp.

Luckily, while the new vulnerability had the potential to be at least as damaging as the previous buffer overflow flaw, it appears that this one was not being actively exploited by attackers prior to being patched by Facebook. However, this demonstrates the importance of keeping such applications up-to-date (so that Facebook-provided security patches are applied) and to consider the risks associated with using these applications for personal communications.

Protecting Against Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are nothing new. They are extremely simple vulnerabilities – only involving a failure to properly manage memory and user input – yet they can be extremely difficult to detect. A wide range of buffer overflow vulnerabilities exist, and sometimes apparently “safe” code can be vulnerable since another vulnerability can be exploited to bypass existing protections against buffer overflows.

The two major WhatsApp vulnerabilities disclosed and patched in 2019 demonstrate the potential impact of a buffer overflow vulnerability in a critical application. Both of these vulnerabilities could be exploited without user interaction, and enabled an attacker to run malicious code within the victim application. In one case, the vulnerability was exploited multiple times to spy upon parties of interest to various governments, leading to a lawsuit by Facebook against the suspected perpetrator.

Protecting against buffer overflow vulnerabilities requires the ability to identify and block potential exploits before they reach a vulnerable application. Deploying a strong web application firewall (WAF) to protect an organization’s web presence and runtime application self-protection (RASP) for critical or potentially vulnerable assets is an important first step toward protecting an organization and its software assets against exploitation.

Use your ← → (arrow) keys to browse

Student @ Advanced Digital Sciences Center, Singapore. Travelled to 30+ countries, passion for basketball.

Continue Reading
Comments

Technology

Are You Aware Of Your Children’s Online Activity?

Published

on

child privacy mother

There’s a big, wide, scary, often strange world out there, and it’s the task of any individual to grow into an adult and begin to contend with it. However, most responsible parents understand that showing the raw facts of life, or being introduced to bad influences is simply not suitable for a young child. They must learn slowly, with care, and appropriately to the degree we’re able to foster that environment. Parents cater to this by controlling what friends their children make, or what hours they may be allowed to spend time with them.

However, a growing cause for concern is the fact that many parents fail to keep their children safe online. The internet may as well be its own world, and it reflects our reality, both the good and the bad, the trustworthy and the terrible. This means that as a parent, it’s important to stay aware of your child’s online activity. If you can do that, you can better control the content they see, what they’re allowed to access, and the influences they are moved by.

Use Worthwhile Content Filters

It’s important to use the best content filters and parental controls you can. Some offer you access to limit internet time, while others help you block certain websites or content from being seen. With the best cyberbullying safety services, you can also ensure that your children are equipped to handle the unfortunate likelihood of encountering abuse online. The more you can engage in good habits now, and regulate their usage, the less likely they are to come to harm within the wild west that is the online world.

Understand The Trends

Understand the trends that occur and know how to deal with them. For instance, you might block access to certain apps or sites, but your child’s friend’s parents may not have the same philosophy. If you know the trends through paying attention to what they’re saying, you will be able to assess if they’re healthy or not. For instance, TikTok is now seen as a negative influence on many young children due to how poorly they moderate their content, and how limited content filters are in place. When you make decisions to help them stay secure, you are in effect limiting the vulnerable pathways in which they could become less safe.

Stay Alert

It’s important to say, but stay alert. If you notice your child is finding it hard to engage with social media, or they follow a risky YouTuber, you are within your right to restrict access or to observe more closely. It’s a tough job, but ultimately you cannot completely banish your child from the internet for the entirety of their childhood. It’s best to help them build healthy habits now and also know how to stay safe online than to pretend it doesn’t exist. To that end, you’ll be making the right choices.

With this advice, we hope you can better stay aware of your children’s online activity, and manage it as appropriately.

Prev postNext post
Use your ← → (arrow) keys to browse

Continue Reading

Technology

How does Technology Affect the Working Environment?

Published

on

Technology-in-2019

Throughout history, machines and technology have changed the way that we work across nearly every industry. From the industrial era, all the way through to the modern age, it would seem that technology has improved working conditions significantly. The impact that it has had is immense. Some of the main changes can be found below.

Speed and Efficiency

Workers in this day and age are far more productive than they have ever been. The impact that technology has had on work, both in communication and manufacturing has increased the rate of production and the speed at which business can occur. Tech in the workplace has also helped workers to become far more efficient. What once took hours can now take minutes. Messages can be sent to clients across the world and proposals and payments can also be transferred instantly. Support for workers can also be found online.  For example, personal injury claim legal help can be obtained online and you can file a claim within minutes.

Working Together as One

Team coordination really has never been easier. When you look at online communication tools and technology you will soon see that people can now work together much more closely. Collaboration is also much simpler to achieve. Even when colleagues are not able to be in the same workplace physically, teams can hold meetings through video technology. They are also able to work on the same documents through file-sharing platforms such as Google Drive and this is fantastic to say the least.

Technology and Office Culture

Everyone knows that tech in the workplace is changing. Beer is available on tap in some workplaces and others are offering video games as a means for their team to relax at the end of a hard day. Open offices are also a trend. The mere idea of creating a better company culture can now be used to lure workers who are in-demand and this doesn’t look to be going away anytime soon. Technology in the workplace has also made it much more possible to work remotely. Companies need to create incentives to try and keep their workers happy and to also keep them drawn into the office.

Live where You Work

One of the biggest impacts of tech in the workplace is the workplace itself. Most jobs require you to clock in and work on-site but there really are so many open positions for those who telecommunicate, and people can now work from home more than ever before. Of course, with so many changes being made it’s not hard to see that so much is being done to try and help support this movement and some companies have even put in the effort to try and make sure that they give their teams the chance to work from home permanently. Only time will tell what the future holds, but right now it looks like tech has had a huge impact on the workplace and the effects are going to be felt for years to come.

Use your ← → (arrow) keys to browse

Continue Reading

Business

Quotes To Get Your Boss To Take Cyber Security Seriously

Published

on

cyber security

There is no denying that data security is something that all businesses need to take seriously today. Unfortunately, there are many companies out there who are failing to do so. This is because they have the “it won’t happen to me attitude.” However, many companies have closed after a data breach. Therefore, to save the future of your business and your job, try to convince your boss with these quotes…

We are going to start with a quote from the founder and CEO of Blue Lava, Inc, Demitrios ‘Laz’ Lazarikos, who talks about implementing a modern program on cyber risk. From privileged access management services to network segregation, we need to stay ahead of the times with our strategy.

“A modern cybersecurity program must have Board and Executive level visibility, funding, and support. The modern cybersecurity program also includes reporting on multiple topics: understanding how threats impact revenues and the company brand, sales enablement, brand protection, IP protection, and understanding cyber risk.”

If your boss thinks he or she is above the law, William Malik, VP and Research Area Director for Information Security at Gartner has a great quote on the matter…

“A business will have good security if its corporate culture is correct. That depends on one thing: tone at the top. There will be no grassroots effort to overwhelm corporate neglect.”

Chairman of the Ponemon Institute, Dr. Larry Ponemon, has spoken about insider attacks. Insider attacks – whether malicious or accidental – are the most common. However, they’re not being taken as seriously as they should…

“We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever.”

While some business owners do implement cyber security controls, there seems to be a lack of thought behind the strategy that is implemented, and this is what Dr. Chris Pierson, CEO at Binary Sun Cyber Risk Advisors has said on the matter…

“What we should actually be doing is thinking about what are our key controls that will mitigate the risks. How do we have those funneled and controlled through the team that we have, how do we work through that in a well-formatted, formulated process and pay attention to those controls we have chosen? Not a continual, add more, add more, add more.”

One of the biggest problems with data security is that a lot of business owners believe it is nothing more than an IT issue. Steven Chabinsky, Global Chair of Data, Privacy & Cybersecurity at White & Case LLP, has put this into perspective…

“Thinking of cybersecurity solely as an IT issue is like believing that a company’s entire workforce, from the CEO down, is just one big HR issue.”

So there you have it: some of the most compelling quotes out there regarding cyber security today. We hope these will help you to convince your boss that it’s critical!

Use your ← → (arrow) keys to browse

Continue Reading

Trending