HOW! Lets Users Modify Group Chats in Whatsapp to Spread Fake News with WhatsApp Flaw 




HOW! Lets Users Modify Group Chats in Whatsapp to Spread Fake News with WhatsApp Flaw



Noredine BAHRI
Noredine BAHRI
  • Technical Writer
  • Entrepreneur
  • Founder and CEO
  • Developer
  • Blogger and IT Analyst
2018-08-11 17:25:57

| Share
| Share
| Share
HOW! Lets Users Modify Group Chats in Whatsapp to Spread Fake News with WhatsApp Flaw

WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.

Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security protocols to change the content of the messages, allowing malicious users to create and spread misinformation or fake news from "what appear to be trusted sources."

The flaws reside in the way WhatsApp mobile application connects with the WhatsApp Web and decrypts end-to-end encrypted messages using the protobuf2 protocol.

The vulnerabilities could allow hackers to misuse the 'quote' feature in a WhatsApp group conversation to change the identity of the sender, or alter the content of someone else's reply to a group chat, or even send private messages to one of the group participants (but invisible to other members) disguised as a group message for all.

In an example, the researchers were able to change a WhatsApp chat entry that said "Great!"—sent by one member of a group—to read "I'm going to die, in a hospital right now!"

It should be noted that the reported vulnerabilities do not allow a third person to intercept or modify end-to-end encrypted WhatsApp messages, but instead, the flaws could be exploited only by malicious users who are already part of group conversations.

to watch Video Demonstration — How to Modify WhatsApp Chats CLICK The NEXT 

click the next for more ...
TensorFlow 1.10 has just been released. Here’s what’s new.
TensorFlow 1.10 has just been released. Here’s what’s new.
TensorFlow 1.10 has just been released. Here’s what’s new.

.
Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
Hacker Leaked Celebrities Naked Photos and Gets 8 Months check the story!

The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrenc


Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
Hacker Leaked Celebrities Naked Photos and Gets 8 Months check the story!

The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrenc


Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
An Interview Question on Spring

Spring Singletons are not Java Singletons. Let's go over the important differences between them and how Spring singletons interact within containe


Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
Introducing Android 9 Pie

After more than a year of development and months of testing by early adopters, we're ready to launch Android 9 Pie, the latest release of Android,


Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
7 company will never see another dollar from you

7 / Terminix : basilcinnamonchives  said “My roommate at the time worked on a farm. We were aware of the possiblity he could bring fle


Hacker Leaked Celebrities Naked Photos and  Gets 8 Months check the story!
7 Absolute Weirdest Wedding Dresses Ever

There are only few occasions in life when your'e the center of attention and everybody's celebrating you. One of these occasions is, of course



© 2013-2018 best of geeks. All rights reserved.