Jump to content
  • In Android versions of Telegram and WhatsApp found a dangerous vulnerability


    The developers of Telegram and WhatsApp have repeatedly stated about the security of their messengers with encryption. But as it turned out, user privacy depends on other factors: the network has a description of an unusual method of fraud using popular Android-applications.

    Symantec experts have published information about the vulnerability of Media File Jacking for Android versions of these messengers. The attack on users was carried out by means of interception of media files bypassing encryption algorithms. Telegram and WhatsApp store the received images either in the internal storage of the messenger or in the external memory. The latter becomes a source of leakage of user files.

    When hackers gain access to external storage using malware, they are able to edit or replace user files. Using the vulnerability, an attacker can edit the image and replace the number of the Bank card or the sender's account with his own. Experts say that this feature of Android-applications is known for a long time, and users have to choose between privacy and advanced functionality when storing data on external drives.

    In Android versions of Telegram and WhatsApp found a dangerous vulnerability

    Using the same vulnerability, attackers can fake audio messages or spread fake news. According to the source, representatives of WhatsApp have already reported the closure of the vulnerability with the latest version of the messenger. Telegram developers have not commented on the situation.


    User Feedback

    Recommended Comments

    There are no comments to display.



    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.

    Loading...

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.