WhatsApp Web, which mirrors the WhatsApp app on a desktop browser, has a potential security flaw that was discovered by a security firm CheckPoint Software, that could puts millions of users at risk.
According to a blogpost by CheckPoint, the WhatsApp web vulnerability could affect 200 million users who access this service.
The post says that hackers can trick users into opening a Vcard, infected with malicious code. The Vcard which contains an executable file that can then be used to target computers by distributing bots, ransomware, RATs, and other malware. It adds that hackers could also use other ways to exploit the security issue, for example by sending files named WhatsApp Emoticons, which some users might be tempted to click.
- WhatsApp obsolete error: Xiaomi says issue impacted their phones, admits fault
- WhatsApp testing new feature to block spam messages: Report
- WhatsApp group chat bug can allow anyone to join, without admin permission: Report
- Netflix partnering with WhatsApp in India, will send content recommendations
- WhatsApp Web beta brings private replies in groups, picture in picture mode, and more
- WhatsApp working on official app for Apple iPad, report says
The issue was verified by WhatsApp and the company issued a fix in the next update as well and to make sure that their account is protected users need to update the feature on their phone.
According to Checkpoint, WhatsApp rolled out the initial fix (in all versions greater than 0.1.4481) and blocked that particular feature on August 27.
WhatsApp recently announced that the app now has 900 million monthly active users. “WhatsApp now has 900 million monthly active users,” posted WhatsApp co-founder Jan Koum in his official Facebook account.
WhatsApp had 700 million monthly active users in January. Within three months, WhatsApp had managed to add another 100 million, taking the count to 800 million monthly active users. Another 100 million active users were recorded within five months in September.
Watch video on WhatsApp’s new features: (App users click here to see video)