WhatsApp flaw let spies take control of phones
Spyware crafted by a sophisticated group of hackers-for-hire took advantage of a flaw in Facebook Inc.’s popular WhatsApp communications program to remotely hijack dozens of targeted phones without any user interaction.
The Financial Times identified the hacking group as NSO Group, an Israeli company that has been widely condemned for selling surveillance tools to repressive governments.
WhatsApp all but confirmed the identification, describing the hackers as “a private company that has been known to work with governments to deliver spyware.” A WhatsApp spokesman later said: “We’re certainly not refuting any of the coverage you’ve seen.”
WhatsApp has released a new version of the app containing a fix.
The spyware did not directly affect the end-to-end encryption that makes WhatsApp chats and calls private. It merely used a bug in the WhatsApp software as an infection vehicle. The malware enables spies to, in effect, take control of a phone — remotely and surreptitiously controlling its cameras and microphones and vacuuming up personal and geolocation data. Encryption is worthless once a phone’s operating system has been violated.
Hackers are always looking for flaws in apps and operating systems that they can exploit to deliver spyware. State-run intelligence agencies including the U.S. National Security Agency invest tens of millions of dollars in it. Google’s ProjectZero bug-hunting team scoured WhatsApp last year looking for vulnerabilities but did not find any. It was WhatsApp’s security team that found the flaw.
The development comes as Facebook looks to triple down on its messaging services by merging WhatsApp, Facebook Messenger and Instagram Direct and bringing WhatsApp-level encryption to the others. The attack would not affect Facebook’s ability to do that.
The malware was able to penetrate phones just through missed calls, using the app’s voice calling function, said the WhatsApp spokesman, who was not authorized to be quoted by name. He said an unknown number of people — an amount in the dozens at least would not be inaccurate — had phones that were infected with the malware, which the company discovered in early May, the spokesman said.
John Scott-Railton, a researcher with the internet watchdog Citizen Lab, called the hack “a very scary vulnerability.”
“There’s nothing a user could have done here, short of not having the app,” he said. The vast majority of hacks involve some sort of user interaction, such as clicking an infected link.
The WhatsApp spokesman said the flaw was discovered while “our team was putting some additional security enhancements to our voice calls.” He said engineers found that people targeted for infection “might get one or two calls from a number that is not familiar to them. In the process of calling, this code gets shipped.”
WhatsApp, which has more than 1.5 billion users, immediately contacted Citizen Lab and human rights groups, quickly fixed the issue and pushed out a patch. The spokesman said WhatsApp also provided information to U.S. law enforcement officials to assist in their investigations.
“We are deeply concerned about the abuse of such capabilities,” WhatsApp said in a statement.
Although WhatsApp urged all users to update the program on their phones, only a minuscule percentage run the risk of being targeted by such malware.
NSO said in a statement that its technology is used by law enforcement and intelligence agencies to fight “crime and terror.”
“We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system,” the statement said. A spokesman for Stephen Peel, whose private equity firm Novalpina recently announced the purchase of part of NSO, did not return an email seeking comment.
The revelation adds to the questions over the reach of NSO’s powerful spyware.
Before the latest WhatsApp revelation, NSO’s spyware has repeatedly been found deployed to hack journalists, lawyers, human rights defenders and dissidents. Most notably, the spyware was implicated in the gruesome killing of Saudi journalist Jamal Khashoggi, who was dismembered in the Saudi consulate in Istanbul, Turkey, last year and whose body has never been found.
Several alleged targets of the spyware, including a close friend of Khashoggi and several Mexican civil society figures, are suing NSO in an Israeli court over the hacking.
Your guide to our new economic reality.
Get our free business newsletter for insights and tips for getting by.
You may occasionally receive promotional content from the Los Angeles Times.