Vulnerability WhatsApp messenger hack allows sending messages

Dec

4

2014

Indian programmers have found a special character set, which disrupt the mobile messenger WhatsApp. “We must conclude that any user can now hack app” – they said.

whats-gluk-3

Vulnerability in the application WhatsApp allows you to remotely disrupt messenger installed on your mobile device. It’s enough to send the recipient a text message consisting of 2,000 words (2 KB). Character sequence published on the website Pastebin developers Indrajit Bhuyan and Sauran Kar.

After receiving malicious code, the user can not read or send messages. The screen goes black, then there is an emergency closure of the client WhatsApp. View text can not be from Notification Center – messenger freezes and returns to the home screen. Restore the program, you can only remove the entire chat entirely.

whats-gluk-2
Sending malicious messages

MacDigger conducted test showed the presence of a failure in WhatsApp. However, the problem has only version of the client for Android. IPhone app with no problems handles malicious code.

whats-gluk-1
The recipient can not open the record

Previously published on the Web User hacking database with WhatsApp chat history. Vulnerability in mobile application allows to obtain full access to the correspondence by attackers from third-party applications installed on your mobile device. Guide for hacking wrote and published in his blog, the independent expert on information security Bass Boskhert.

Which is typical, then the vulnerability was relevant only for Android-version of WhatsApp. On the iPhone use a bug prevented protection algorithms, built directly into the platform iOS. They isolate each running application, inhibiting access to all the files from the outside.

Join us at Twitter , VKontakte , Facebook , Google+ or via RSS , to keep abreast of the latest news from the world of Apple, Microsoft and Google.

Viewing:-187

In: Technology & Gadgets Asked By: [15785 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »