The developers of Telegram and WhatsApp have repeatedly stated about the security of their messengers with encryption. But as it turned out, user privacy depends on other factors: the network has a description of an unusual method of fraud using popular Android-applications.
Symantec experts have published information about the vulnerability of Media File Jacking for Android versions of these messengers. The attack on users was carried out by means of interception of media files bypassing encryption algorithms. Telegram and WhatsApp store the received images either in the internal storage of the messenger or in the external memory. The latter becomes a source of leakage of user files.
When hackers gain access to external storage using malware, they are able to edit or replace user files. Using the vulnerability, an attacker can edit the image and replace the number of the Bank card or the sender's account with his own. Experts say that this feature of Android-applications is known for a long time, and users have to choose between privacy and advanced functionality when storing data on external drives.
Using the same vulnerability, attackers can fake audio messages or spread fake news. According to the source, representatives of WhatsApp have already reported the closure of the vulnerability with the latest version of the messenger. Telegram developers have not commented on the situation.