WhatsApp exploit lets hackers manipulate group chat messages
Researchers say the flaw could be used to spread fake news across the platform
Researchers have uncovered a vulnerability in WhatsApp's encryption method that can allow malicious actors to manipulate messages and user identities in group chats, with the fear that this could be used to spread fake messages and news.
All messages sent through the service are secured via end-to-end encryption meaning not even WhatsApp is able to see them. But a team from Check Point Research discovered three methods of attack that can be derived from reversing this encryption process, and then accessing the decrypted communications data.
Using the 'quote' feature in a group chat, hackers can change the identity of a sender, alter the text of a previously sent message, and send a private message to a group member disguised as a public message meaning their response (to what they believe is a private message) will be made public.
WhatsApp has denied this is a vulnerability, and insists end-to-end encryption remains safe.
"WhatsApp, has over 1.5 billion users with over one billion groups and 65 billion messages sent every day. With so much chatter, the potential for online scams, rumours and fake news is huge," Check Point Research's Dikla Barda, Roman Zaikin and Oded Vananu wrote in a blog post.
"It doesn't help then, if threat actors have an additional weapon in their arsenal to leverage the platform for their malicious intentions."
"Following the process of Responsible Disclosure, Check Point Research informed WhatsApp of their findings. From Check Point Research's view, we believe these vulnerabilities to be of the utmost importance and require attention."
After decrypting WhatsApp messages and accessing them via the web, the researchers were able not only to see the individual parameters that make up the messages i.e. the sender name, message content, recipient name, etc but manipulate these fields.
In one example, researchers were able to change a message posted in a group chat from a link to an article recommending "great health tips", to a message that read "guys I just heard product X can cause illness in children. I will not be buying it anymore!!" using the quote feature.
The researchers also developed a version of the tool they used to demonstrate the exploits that users can download for free via Github.
WhatsApp's use of end-to-end encryption, fully employed since 2016, has drawn the ire of national governments and security agencies, who argue the messaging app can be used by extremists to plot terrorist attacks without being traced.
Crucially, because the nature of this form of encryption means WhatsApp doesn't store any of the data sent using the app, it's difficult to see how messaging service to verify or cross-reference suspected fake messages with 'originals' if they are manipulated using methods such as those deployed by Check Point Research.
"We carefully reviewed this issue and it's the equivalent of altering an email to make it look like something a person never wrote," a WhatsApp spokesperson said.
"This claim has nothing to do with the security of end-to-end encryption, which ensures only the sender and recipient can read messages sent on WhatsApp.
"We take the challenge of misinformation seriously and recently placed a limit on forwarding content, added a label to forwarded messages, and made a series of changes to group chats.
"We ban accounts that attempt to modify WhatsApp to engage in spammy behavior and we are working with civil society in several countries to educate people about fake news and hoaxes."
The spokesperson added that to make the changes Check Point Research suggested, WhatsApp would be required to log all messages - which it was not prepared to do for the sake of user privacy - or severely limit the functionality of group chats.
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Evaluate your order-to-cash process
15 recommended metrics to benchmark your O2C operationsDownload now
AI 360: Hold, fold, or double down?
How AI can benefit your businessDownload now
Getting started with Azure Red Hat OpenShift
A developer’s guide to improving application building and deployment capabilitiesDownload now