TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WhatsApp Security Vulnerability

100 pointsby c0rtexover 8 years ago

7 comments

aylonsover 8 years ago
While people discuss about a possible state-actor stronghanding WhatsApp and the semantics of backdoor, the &quot;design feature&quot; of not showing the key changes are making real victims, at least in Brasil:<p>The attacker first try to duplicate the mobile phone number of the first victim, probably by social engineering their phone company. This part may look difficult to do, but it is not hard if you realize you do not need to target anyone special - everyone uses WhatsApp, so any number gives a high probability of success.<p>After getting the first victim number, the attacker install WhatsApp, which gladly verifies the user via SMS - WA has no login, no password, so anyone receiving the SMS can impersonate anyone else.<p>As Whatsapp does not send any alert of key change by default, the attacker is free to impersonate to person - in this case, he simply asks for some borrowed money to be transferred to a bank account, which will be paid soon. The recipient has no reason to distrust the message - it is being sent by his friend in the same chat window as they always talked to, even the logs are there. There is no message to warn about the potential issue, by design!<p>This is no hypothesis - this is actually happening for some time, now.[1] This design feature surely has some loyal users.<p>[1]<a href="http:&#x2F;&#x2F;www.correiobraziliense.com.br&#x2F;app&#x2F;noticia&#x2F;cidades&#x2F;2016&#x2F;05&#x2F;11&#x2F;interna_cidadesdf,531298&#x2F;brasilienses-caem-em-fraudes-cometidas-atraves-de-aplicativo-de-celula.shtml" rel="nofollow">http:&#x2F;&#x2F;www.correiobraziliense.com.br&#x2F;app&#x2F;noticia&#x2F;cidades&#x2F;201...</a>
评论 #13419100 未加载
评论 #13419894 未加载
评论 #13421363 未加载
评论 #13420829 未加载
评论 #13420451 未加载
评论 #13419355 未加载
ckastnerover 8 years ago
The article mostly just quotes two other sources that have already been discussed here:<p><i>WhatsApp backdoor allows snooping on encrypted messages</i>, <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13389935" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13389935</a><p><i>There is no WhatsApp &#x27;backdoor&#x27;</i>, <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13394900" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13394900</a>
评论 #13418648 未加载
agdover 8 years ago
The question for me is that posed by the hacker who discovered the vulnerability. Here&#x27;s what he said [1]:<p>&quot;He (Moxie) said: “The choice to make these notifications ‘blocking’ would in some ways make things worse. That would leak information to the server about who has enabled safety number change notifications and who hasn’t, effectively telling the server who it could man-in-the-middle transparently and who it couldn’t; something that WhatsApp considered very carefully.”<p>This claim is false. Those “blocking” clients could instead retransmit a message of the same length that just contains garbage and this message would just not be displayed by the receiver’s phone. Encryption guarantees the garbage or real messages are indistinguishable in the encrypted form. Hence, this technique would make identifying users with the additional security enabled on a large scale impossible.&quot;<p>This was raised in the previous WhatsApp vuln thread but as far as I&#x27;m aware, Moxie is yet to address this criticism. Would be good to get a response on this.<p>[1] <a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2017&#x2F;jan&#x2F;16&#x2F;whatsapp-vulnerability-facebook" rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;technology&#x2F;2017&#x2F;jan&#x2F;16&#x2F;whatsapp-...</a>
评论 #13419817 未加载
评论 #13419854 未加载
wyldfireover 8 years ago
Even if they changed this specific design decision&#x2F;vulnerability, it seems like there&#x27;s a big gaping hole (or I&#x27;m missing something).<p>Given that WhatsApp brokers the initial key exchange, lawful interdiction can take place at WhatsApp under subpoena. What we hope is the case is that WhatsApp would fight these orders in court, claiming that the keys are merely forwarded and aren&#x27;t stored by design. But if they fought and lost, then presumably they&#x27;d comply with the orders and the provision not to reveal the order. Do we really think that WhatsApp and&#x2F;or Facebook have the conviction of Ladar Levison?<p>It would seem that all new accounts created at WhatsApp after that theoretical warrant is executed are at risk.
评论 #13418302 未加载
eridiusover 8 years ago
If your threat model is the government compelling Facebook, then you should be using a different product that&#x27;s geared specifically towards security, such as Signal. WhatsApp is a mass-market product aimed at the whole world, which means it makes different tradeoffs, providing a less comprehensive threat model in favor of higher usability. And that&#x27;s a perfectly fine thing for this app to do.
评论 #13423713 未加载
folexover 8 years ago
I didn&#x27;t quite grasp why attacking entity (e.g. government) has the ability to read messages. What does &quot;WhatsApp has the ability to force the generation of new encryption keys for offline users&quot; mean? Does it mean that WhatsApp backend has the ability to force sender to use pregenerated compromised key provided by attacker? In terms of WhatsApp security whitepaper, does that mean that attacker can force sender to use newly generated (by attacker) S_recipient, O_recipient and the main one, I_recipient? I&#x27;m asking because &quot;force the generation of new _encryption_ keys&quot; doesn&#x27;t really specify who would generate keys, or what about identity key that signs everything.
评论 #13418628 未加载
评论 #13419713 未加载
评论 #13420544 未加载
arrakeenover 8 years ago
conspicuously missing from this discussion is the self-healing capabilities of the signal protocol, which as far as i understand is a major feature. when marlinspike says, &quot;This is called a \&quot;man in the middle\&quot; attack, or MITM, and is endemic to public key cryptography, not just WhatsApp,&quot; i find it odd that he wouldn&#x27;t even address the fact that the signal protocol has protections against this built into the protocol.