[ad_1]
You probably know that last week, WhatsApp was at the center of a controversy following the revelation of a major vulnerability in the messaging application.
The security flaw in question exploits what is called a buffer. overflow to allow an attacker to install spyware on the target device and subsequently access a large amount of personal data; calls, texts, photos, location and other data on the handset, as well as the ability to activate the phone's camera and microphone for real-time monitoring activities.
This attack reportedly used spyware referred to as Pegasus – other information about it soon – that allows your phone to be infected via a simple WhatsApp call, which does not even need to be answered .
Just call to switch and, after gaining access to the device, the attacker can change the call history to hide his malicious activities.
The good news (relatively speaking) is that WhatsApp has already fixed this security hole. . The bad news is that many people still have not updated the fixed version of the application.
From a more general point of view, this incident also makes us wonder if encrypted messaging services such as WhatsApp may be secure enough to protect personal communications and data.
Pegasus and the group NSO
break down this attack a little more detail. How it works? The hacker modifies the data packets sent during a voice call to the victim, causing an internal buffer to be overflowed in the WhatsApp application (hence the name "buffer overflow attack"), overwriting thus some of the memory and thus avoiding the security of the application, allowing the hacker to access the phone.
This access is then used to install spyware, which would be Pegasus spyware produced by the NSO group, according to the Financial Times. Note that this is not yet clear, and that NSO is currently investigating the issue.
Also, as TechCrunch points out, even though Pegasus is used here, NSO itself is not behind any attack, but rather the customer who purchased the group's software.
NSO further emphasizes that it uses a "rigorous" accreditation and verification process and investigates "any credible allegation of abuse and that, where appropriate, we take action, including stopping the system. ".
If Pegasus is new to you, NSO sells spyware as a countermeasure to fight terrorism and crime. The company explains, "We provide the tools that help the official authorities to legally deal with the most dangerous problems in the world today. Governments use our products to fight terrorism, dismantle criminal operations, locate missing persons and badist search and rescue teams. "
When a "good" spyware is spoiled
In theory, Pegasus is used to compromise the devices of terrorists and criminals, thus facilitating surveillance so that the world remains safer place. Pegasus uses similar tools that also exploit vulnerabilities or backdoors, but the problem is that such spyware still has the potential to be misused.
Oppressive regimes can potentially use powerful spyware to control citizens, and possibly even extirpate dissidents, spies political opponents or human rights activists – the sky is the limit as to how that these spyware can be abused (or maybe the bowels of hell would be a more appropriate limit, as we look down on it
And even though it is presumed that Pegasus would have had successes, such as the arrest of the Mexican drug lord Joaquín Guzmán, there is also a lot of negative press circulating (and this is indeed the case with other spyware used by the state). In mid-2016, we reported that Pegasus was being used to target human rights activist Emirati Ahmed Mansoor.
At the end of 2018, a Saudi dissident filed a lawsuit against Pegasus, alleging that he had been used against the murdered journalist Jamal. Khashoggi and Amnesty International have filed a lawsuit claiming there was "an abundance of reports of governments deploying the Pegasus spyware platform to monitor human rights defenders" ".
Of course, all this deserves reflection while it is globally disturbing from a global point of view, what about the smaller one? Should the WhatsApp incident give the average person a source of concern for the security of their personal data when using WhatsApp or similar messenger services?
Can Encrypted Messaging Services Really Be Secure?
This question may be of concern to you as a result of the revelation of the WhatsApp security breach.
– the final encryption, which allows users to feel safe. As the company explains on its website, "just like your messages, WhatsApp calls are encrypted end-to-end so that WhatsApp and third parties can not listen to them."
And that is true – every message or call is unique and transparently encrypted so that the content can only be read or heard by anyone other than the sender / l '. calling and the recipient.
However, this encryption does not mean anything if the software itself has a vulnerability that can be exploited to install spyware which effectively corrodes the entire device is open, as it is the case with WhatsApp.
More generally, the question is: can software really be secure? It is obviously impossible to give guarantees on this front, so the short answer is no; not really.
Etienne Greeff, CTO and co-founder of SecureData, told us: "The underlying operating systems may seem very secure, like iOS, but the entire ecosystem, including all applications of the operating system, is complex and complex. complicated, it becomes very difficult to have complete security. In addition, only a few of the "zero-day" security tools used to secure these complex systems would have been effective.
We asked Greeff to explain a little bit why the "zero-day" security tools mentioned above – that is, typical antivirus / security applications – would have been ineffective . He explained, "The memory space of Android is such that no other process can access the memory of other processes. At best, these tools verify that they are not themselves a virus … In the case of the WhatsApp problem, this feature was exploiting this application would have been opaque compared to other alleged security tools, because of the limitation of the memory. "
Daniel Follenfant, Director, Penetration Testing, Consulting Services NTT Security, underlined that securing applications was a constant struggle, and that if they were perfectly leakproof, we obviously would not need to update them permanently with security patches.
Follenfant pointed out that "any Windows user will have seen patches happen all the time, but we still believe that they will monitor security vulnerabilities and fix them, as WhatsApp did."
"We must remain confident that sellers will do it. To monitor and review these vulnerabilities, nowadays, competition and application revenue mean that if you (as a provider) are not perceived as a positive action, you will lose your users and move on to other thing.
It's Clear that Businesses A promising protection for your sensitive data such as WhatsApp should be at the forefront of security and must act quickly to minimize the damage caused by a security breach, with quick fixes, such as was the case here.
) even more positive, in terms of potential damage, we must keep in mind that the WhatsApp attack was not a scattergun-like campaign spread across all locations, unlike most malicious programs. We are talking about targeted victims selected from among the victims of a sophisticated attack, including lawyers and journalists.
As The Guardian reports, to date, a human rights lawyer and a researcher for Amnesty International are among the known targets. .
It is therefore likely that unless your work is going in the same direction and involves sensitive or potentially interesting data, you are probably not targeted. Obviously, only a small number of people have been affected anyway, and although the exact number is unknown, it is a figure of "at least a dozen people" according to a WhatsApp spokesperson.
There is no way to know for sure that your your account has not been compromised, but remember that if you do not receive a WhatsApp voice call from # 39; an unknown number (or an interrupted call), you are probably in the clear.
Even if you're not likely to, however, the prospect of spreading spyware as invasive via a secure messaging application remains very worrisome. The problem is that popular encrypted messaging services such as WhatsApp, which has 1.5 billion users, represent such an important and lucrative target for those who are highly motivated financially.
These types of services will therefore inevitably be questioned about the vulnerabilities of unplugged hackers who, if they find a feat, could use it to provide a sophisticated form of spyware that incorporates powerful monitoring capabilities and capability to operate furtively on the device of the victim.
Etienne Greeff observes that the WhatsApp incident "shows the effects of very large pockets of state on ordinary citizens."
"The NSO group exists because governments and public bodies have the capacity to pay six zero-day sums that they can use for their own political purposes. Ordinary people and reverberates on civilian life as we have seen with Khashoggi and others. "