AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Telegram for desktop1/16/2024 “WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients,” he said. In order to fix the exploit, Vanunu says both companies sprung into action when they received the report. It’s like a bomb being mailed through the post office and only being opened at the starting point and destination. Because of this, neither WhatsApp nor Telegram would know that the chats they’re transmitting containing malicious code. The encryption method prevents anyone other than the sender and receiver from reading chats, including the owners of these services. The main problem Check Point noticed here is that the very same end-to-end encryption prided by both WhatsApp and Telegram was their downfall. How the hack works on WhatsApp Web - Check Point Software In addition, with your account in hand, the hacker can now also attempt to widen his reach by sending out the same photo to your contacts, who will automatically trust a file sent by a friend. “This means that attackers could potentially download your photos and or post them online, send messages on your behalf, demand ransom, and even take over your friends’ accounts.” “This vulnerability, if exploited, would have allowed attackers to completely take over users’ accounts on any browser, and access victims’ personal and group conversations, photos, videos and other shared files, contact lists, and more,” Check Point’s head of product vulnerability Oded Vanunu said in a blog post. On Telegram Web, users have to open the image in a new tab for the attacker to gain entry, though from there onwards it’s just as easy to access as WhatsApp. Once the user clicks to open the image on WhatsApp Web, the malicious file gives the hacker access to your device’s local storage, where your account data is stored. To exploit the flaw, a hacker could simply send a photo to the target victim, containing malicious code. You only have to worry if you’ve been using the desktop platforms for the apps, namely WhatsApp Web and Telegram Web. One thing to note here, is that general WhatsApp and Telegram users are still safe. It’s still not clear how many accounts may have been at risk, though the Check Point report estimates it in the range of“hundreds of millions”. The company said it discovered the vulnerability a week ago on March 7, which it then reported to both WhatsApp and Telegram, waiting for them to finish patching it before releasing the news. Security research firm Check Point Software Technologies on Wednesday released a report of the flaw that could compromise your account. The irony? It’s not an oversight that caused the misstep, but instead an attempt at providing maybe too much privacy. It does not store any personal data.A vulnerability in the encryption systems of both WhatsApp and Telegram means hackers can swoop in and seize control of your account. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly.
0 Comments
Read More
Leave a Reply. |