. Military Space News .
CYBER WARS
WhatsApp, security and spyware: what happened
By Rob Lever
Washington (AFP) May 17, 2019

Facebook-owned WhatsApp's revelation of a security flaw allowing hackers to inject spyware on smartphones raised fresh concerns about the security of the mobile ecosystem.

Here are five key questions and answers:

What happened to WhatsApp?

The security hole in the WhatsApp messaging app could enable an attacker to inject malware to gain access to Android or Apple smartphones.

WhatsApp patched the flaw this week after being informed that the spyware was being used to track human rights activists and lawyers.

Security researchers believe the attackers used the powerful Pegasus spyware from Israel-based NSO Group. According to a recent analysis of the software by the security firm Lookout, Pegasus can "subvert" the device's security and "steals the victim's contact list and GPS location, as well as personal, Wi-Fi, and router passwords stored on the device."

The infection could take root with a simple call through WhatsApp. To make matters worse, victims may not know their phones were infected because the malware allowed attackers to erase call histories.

This delivery was "particularly scary," said security researcher John Dickson of the Denim Group, because it infected devices without any user action.

"Normally a user has to click on something or go to a site, but that wasn't the case here," Dickson said. "And once (the attacker) is in, they own the device, they can do anything."

Who is to blame?

While the flaw was discovered in WhatsApp, security experts say any application could have been a "vehicle" for the spyware payload.

"We have not yet been able to write software that doesn't have bugs or flaws," said Joseph Hall, chief technologist for the Center for Democracy & Technology, a digital rights group.

Hall said the encryption in WhatsApp was not broken and that "Facebook's response was exceedingly fast."

Marc Lueck of the security firm Zscaler said that based on Facebook's response, "You should give them kudos for discovering it in the first place, this was a very deep vulnerability."

The intrusion at WhatsApp "wasn't an attack on encryption, it was an attack on another element of the application" said Lueck.

Is encryption still worthwhile?

Encryption remains an important feature by establishing a secure "tunnel" between two parties that verifies their identities, Lueck noted.

"Encryption isn't important just for privacy, it's important for trust," he said.

Encryption used by WhatsApp and other messaging applications prevents eavesdropping on messages and conversations but does not protect against an attack that gains access to the device itself, researchers note.

"End to end encryption does nothing to protect against attacks on your endpoint, true. And seatbelts and airbags do nothing to prevent your car from being hit by a meteorite," tweeted Matt Blaze, a Georgetown University computer security expert.

"While neither protects against every possible harm, they both remain the most effective defenses against very common harm."

Dickson said that while no encryption is foolproof, the only way to completely avoid hacking would be to avoid electronics entirely: "You could use guys on horseback."

Should I worry about being attacked?

Citizen Lab, a research center at the University of Toronto, said in a 2018 report that it found Pegasus spyware infections in 45 countries, with 36 "probable government operators."

NSO maintains it delivers its software for legitimate law enforcement and intelligence purposes. But the Toronto researchers said it had been obtained by countries with "dubious" human rights records and suggested it may have been used by Saudi Arabia to track and kill dissident journalist Jamal Khashoggi.

Citizen Lab researchers wrote in the Globe & Mail that they "unearthed at least 25 cases of abusive targeting of advocacy groups, lawyers, scientists and researchers, investigators into mass disappearances and media members."

But Lueck said programs such as Pegasus are extremely costly and cannot easily be monetized by hackers for profit.

"Your average person is not the target of this specific piece of software, which is built to sell to governments to target individuals and doesn't work on a large scale," he said.

Still, Lueck said the flaw underscores the fact that "the mobile phone ecosystem has become as insecure and as vulnerable a platform as the computer."

- Do governments need better digital tools? -

The revelations come as governments seek better tools to track criminals and extremists using encrypted messaging. An Australian law requires tech giants to remove electronic protections and help with access to devices or services.

Law enforcement agencies have complained of "going dark" in the face of encrypted electronic communications as they investigate serious crimes like terrorism and child sex offenses.

But Hall said that the news about Pegasus shows governments have tools to exploit software flaws for specific targeting without weakening encryption and privacy for all users.

"You can target the delivery at specific people rather than breaking into everyone's phone at once," he said.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Trump ramps up battle against Chinese telecom giant Huawei
Washington (AFP) May 16, 2019
Donald Trump stepped up his battle against Huawei Wednesday, effectively barring the Chinese telecom giant from the US market and adding it to a blacklist restricting US sales to the firm amid an escalating trade war with China. An executive order signed by the president prohibits purchase or use of equipment from companies that pose "an unacceptable risk to the national security of the United States or the security and safety of United States persons." "This administration will do what it takes ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Patriot system, transport ship sent to Middle East as Iran tensions rise

Lockheed Martin awarded $84.9 million Navy contract for AEGIS system development

State Department approves $2.7B Patriot system sale to UAE

Turkey to buy Russian missiles despite US 'threats'

CYBER WARS
F-35C jets to be armed with hypersonic cruise missiles

Raytheon to provide U.S. Marines with Naval Strike Force Missile

Missile contracts surge as US exits arms treaty: study

Raytheon receives $419 million for Sidewinder missiles, parts

CYBER WARS
Obstacles to overcome before operating fleets of drones becomes reality

Ascent AeroSystems Announces New Industrial Grade Drone and Launch Customer

Iris Automation offers turnkey collision-avoidance solution for commercial drones

Boeing's MQ-25 refueling drone moved to air base for flight testing

CYBER WARS
Next AEHF satellite shipped to Cape Canaveral for June launch

Airbus and Thales Alenia Space to build two SpainSAT NG satellites

Boeing awarded $605M for Air Force's 11th WGS comms satellite

SLAC develops novel compact antenna for communicating where radios fail

CYBER WARS
Expediting Software Certification for Military Systems, Platforms

With Insights from Integration Exercise, SubT Challenge Competitors Prepare for Tunnel Circuit

Marines to field enhanced handheld targeting system later this year

Marines to replace LAV with new armored vehicle in next decade

CYBER WARS
Yemen arms inquiry poses threat to French press freedom: NGOs

France confirms contested arms shipment to Saudi Arabia

Shanahan: Trump chooses a business manager for defense chief

Yemen war: breaking point in EU arms sales to Gulf?

CYBER WARS
US warns EU over 'poison pill' defence plans

US-China standoff heralds risky shake-up of global order: analysts

Top cardinal says 'many questions' remain despite Vatican thaw with China

US 'candy bomber' back in Berlin after 70 years

CYBER WARS
Monitoring the lifecycle of tiny catalyst nanoparticles

Fast and selective optical heating for functional nanomagnetic metamaterials

2D gold quantum dots are atomically tunable with nanotubes

Harnessing microorganisms for smart microsystems









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.