WhatsApp was seen as something that is impermeable after it introduced end-to-end encryption.
“WhatsApp has no ability to see the content of messages or listen to calls onWhatsApp. That’s because the encryption and decryption of messages sent on WhatsApp occurs entirely on your device.” An answer in WhatsApp FAQ page read.
What is there to worry about? After all, if the markers of one of the world’s most popular instant messaging platform can’t read the messages you send on the platform, who can?
While it may be true that encryption makes WhatsApp messages almost impossible to read covertly, it seems that the platform is not immune to vulnerabilities and exploitations.
Following a security flaw that allowed hackers to insert spyware into smartphones, the app is at the centre of fresh concerns about mobile security.
What happened to WhatsApp?
The security hole in the WhatsApp messaging app could enable an attacker to inject malware to gain access to Android or Apple smartphones. In this case, the hole was used to track human rights activists and lawyers that use the application.
Facebook (who owns WhatsApp) was commendably quick to patch the hole as soon as it was discovered. However, the extent of the damage and how much information was obtained because of the security breach is not known.
Security researchers believe the attackers used the powerful Pegasus spyware from Israel-based NSO Group. According to a recent analysis of the software by the security firm Lookout, Pegasus can “subvert” the device’s security and “steals the victim’s contact list and GPS location, as well as personal, Wi-Fi, and router passwords stored on the device”.
Researchers believe that the method may have been used to track and kill dissident journalist Jamal Khashoggi.
The infection could take root with a simple call through WhatsApp. To make matters worse, victims may not know their phones were infected because the malware allowed attackers to erase call histories.
This delivery was “particularly scary”, said security researcher John Dickson of the Denim Group, because it infected devices without any user action.
“Normally a user has to click on something or go to a site, but that wasn’t the case here,” Dickson said. “And once (the attacker) is in, they own the device, they can do anything.”
Any application can be exploited in the same manner
While the flaw was discovered in WhatsApp, security experts say any application could have been a “vehicle” for the spyware payload.
“We have not yet been able to write software that doesn’t have bugs or flaws,” said Joseph Hall, chief technologist for the Centre for Democracy & Technology, a digital rights group.
Hall said the encryption in WhatsApp was not broken and that “Facebook’s response was exceedingly fast.”
Marc Lueck of the security firm Zscaler said that based on Facebook’s response, “You should give them kudos for discovering it in the first place, this was a very deep vulnerability.”
The intrusion at WhatsApp “wasn’t an attack on encryption, it was an attack on another element of the application” said Lueck.
The only way to avoid being hacked is to avoid electronics entirely
Encryption remains an important feature by establishing a secure “tunnel” between two parties that verifies their identities, Lueck noted.
“Encryption isn’t important just for privacy, it’s important for trust,” he said.
Encryption used by WhatsApp and other messaging applications prevents eavesdropping on messages and conversations — that still works — but encryption does not protect against an attack that gains access to the device itself, researchers note.
“End to end encryption does nothing to protect against attacks on your endpoint, true. And seatbelts and airbags do nothing to prevent your car from being hit by a meteorite,” tweeted Matt Blaze, a Georgetown University computer security expert.
“While neither protects against every possible harm, they both remain the most effective defences against very common harm.”
Dickson said that while no encryption is foolproof, the only way to completely avoid hacking would be to avoid electronics entirely: “You could use guys on horseback.”
Your average person is not a target
Citizen Lab, a research centre at the University of Toronto, said in a 2018 report that it found Pegasus spyware infections in 45 countries, with 36 “probable government operators”.
NSO maintains it delivers its software for legitimate law enforcement and intelligence purposes. But the Toronto researchers said it had been obtained by countries with “dubious” human rights records and suggested it may have been used by Saudi Arabia to track and kill dissident journalist Jamal Khashoggi.
Citizen Lab researchers wrote in Canadian daily, Globe & Mail that they “unearthed at least 25 cases of abusive targeting of advocacy groups, lawyers, scientists and researchers, investigators into mass disappearances and media members.”
But Lueck said programs such as Pegasus are extremely costly and cannot easily be monetised by hackers for profit.
“Your average person is not the target of this specific piece of software, which is built to sell to governments to target individuals and doesn’t work on a large scale,” he said.
Still, Lueck said the flaw underscores the fact that “the mobile phone ecosystem has become as insecure and as vulnerable a platform as the computer”.
Governments have the tools to exploit software flaws
The revelations come as governments seek better tools to track criminals and extremists using encrypted messaging. An Australian law requires tech giants to remove electronic protections and help with access to devices or services.
Law enforcement agencies have complained of “going dark” in the face of encrypted electronic communications as they investigate serious crimes like terrorism and child sex offenses.
But Hall said that the news about Pegasus shows governments have tools to exploit software flaws for specific targeting without weakening encryption and privacy for all users.
“You can target the delivery at specific people rather than breaking into everyone’s phone at once,” he said. — Malay Mail.