WhatsApp Web, which mirrors the WhatsApp app on a desktop browser, has a potential security flaw that was discovered by a security firm CheckPoint Software, that could puts millions of users at risk.
According to a blogpost by CheckPoint, the WhatsApp web vulnerability could affect 200 million users who access this service.
The post says that hackers can trick users into opening a Vcard, infected with malicious code. The Vcard which contains an executable file that can then be used to target computers by distributing bots, ransomware, RATs, and other malware. It adds that hackers could also use other ways to exploit the security issue, for example by sending files named WhatsApp Emoticons, which some users might be tempted to click.
- Building traceability will undermine end-to-end encryption: WhatsApp
- On issue of traceability, WhatsApp says ‘will not weaken privacy protection’
- WhatsApp backups to be deleted by Google Drive? Not really, here’s why
- Researchers find flaw in WhatsApp; ‘private, group messages can be manipulated’
- WhatsApp forwarded message limit in India is now five chats: Here’s what it means
- How to speed up WhatsApp and fix other performance slowdown issues
The issue was verified by WhatsApp and the company issued a fix in the next update as well and to make sure that their account is protected users need to update the feature on their phone.
According to Checkpoint, WhatsApp rolled out the initial fix (in all versions greater than 0.1.4481) and blocked that particular feature on August 27.
WhatsApp recently announced that the app now has 900 million monthly active users. “WhatsApp now has 900 million monthly active users,” posted WhatsApp co-founder Jan Koum in his official Facebook account.
WhatsApp had 700 million monthly active users in January. Within three months, WhatsApp had managed to add another 100 million, taking the count to 800 million monthly active users. Another 100 million active users were recorded within five months in September.
Watch video on WhatsApp’s new features: (App users click here to see video)