This is a particularly scary attack, as there’s not much the user can do to combat this bar uninstalling the app. There are no links to click or websites to visit; the hacker simply calls the victim’s WhatsApp number, and it injects the malware payload after the call has been received.
This attack used what’s called a “buffer overflow” to get into people’s apps. Buffer overflow attacks are when hackers cause malicious code to “leak” into the source code of the software they want to attack. Software and apps have a buffer within that can be used to input things.
If the software isn’t careful with how it handles the buffer, a hacker can ask the software to write data that’s larger than the buffer size. The end result is that the malicious code “leaks” into the source code, at which point the hacker can modify the software and make it do as they please.
Of course, when a WhatsApp user receives a call, the app needs to know what the user wants to do with it. Therefore, it uses the buffer to store the action the user wants to take, such as answering the call or hanging up. In this window of opportunity, the hacker could stuff code into the buffer and cause it to overflow into the app’s code, then use this foothold to steal data.
Buffer overflow attacks happen when a software programmer doesn’t double-check to ensure that user input can’t overflow the buffer. Typically, programmers tell the software not to accept data entries that are too large. For example, if an app asks a user for a name, and there’s only room for ten characters, it has to double-check the input to ensure it doesn’t contain eleven or more letters.
If they don’t, they run the risk of people exploiting this flaw to cause a buffer overflow. Buffer overflows crash the software at best and create a hole for exploitation at worst. As such, it’s important that programmers tell their apps to look out for erroneous entries and deny any incorrect inputs before they go on the buffer.
Hopefully, by the time you’ve read this article, you’re already safe from this attack! As soon as the news broke about this exploit, WhatsApp pushed out an update to fix it. If you haven’t done an app update in a while, it’s worth telling your phone to double-check and ensure it has the latest version of WhatsApp installed. Once installed, you’ll be safe from this attack and need not worry about missed calls again!
But what if you’re unsure whether your WhatsApp has been updated? It’s worth double-checking your WhatsApp version to check if it’s updated. Facebook mentioned the affected versions in its alert
πππππππππππππππππ
Please watch the FULL VIDEO to know , How it Works .
πππππππππππππππππ
π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»
{ Other Tutorial Playlist )
Mobile Service Tutorial in Tamil:-
Java Tutorial in Tamil:-
HTML Tutorial in Tamil:-
CSS Tutorial in Tamil:-
π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»
ππππππππππππππππππ
( Other Social Media )
Facebook:-
Twitter:-
Instagaram:-
ππππππππππππππππππ
Don't forgot to LIKE||SHARE||SUBSCRIB
#Tech #Technology #Tricks #Tips #Hacks #Edits #How #To #Android #Iphone #Ios #Mobile #Laptop #Computer #Youtube #Google #Facebook
#Instagaram #Twitter #Tamil #English #Videos #Review #Unboxing #New #Multimedia #tamil #thittachery #nagapattinam #tamilnadu
********************************************************************
Friends, Please Subscribe for More Videos..
YouTube :
*********************************************************************
If you have any questions feel free to ask them in the comment box below!
*********************************************************************
More Tutorials of JA Technology
Mobile Tricks And Tips :
Pc Trick And Tips :
Internet Tricks And Tips :
Photoshop Tutorial :
Top 10 And 5 :
0 Comments