New Delhi: If you have received an MP4 video file on WhatsApp from an unknown number, you could be a victim of a new kind of hacking which uses a recently discovered vulnerability of WhatsApp to install malicious spywares in phones.

This security vulnerability allowed a remote attacker to target phones by sending a video file in MP4 format.

When notified about the security breach, the Indian Computer Emergency Response Team (CERT) categorised the threat under "High Severity" category.

Pegasus-like features

Israel-based spyware maker NSO Group was under spotlight recently for allegedly providing technology [Pegasus spyware] that used WhatsApp's video calling feature to attack user's phones.

A security message notified by WhatsApp's parent company Facebook said, "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user."

Identified as CVE-2019-11931, this vulnerability message is similar to the one received by CERT from WhatsApp during the Pegasus snooping case.

According to the communication, this weakness could allow a remote attacker to force "Denial of Services (DoS) and Remote Code Execution (RCE)" which could be used to compromise any device running Android, iOS or Windows.

An attacker could use a person's cell number to send a video file through WhatsApp and install an unwanted program in their phones exploiting such vulnerability.

This security issue exists on both individual and business versions of the popular messaging app until the updates were rolled out in October earlier this year.

Although the latest security patch from WhatsApp claims to have fixed this problem, WhatsApp and Facebook have not given further details about the extent of possible execution of this exploit.

This comes even as the controversy around WhatsApp snooping refuses to die down, where phones of over a dozen activists, journalists and lawyers were allegedly compromised by an Israel-made spyware.

WhatsApp has been under fire for not providing adequate information to Indian authorities about the extent of attacks during Pegasus breach. The messaging app has sued NSO Group in a US court for violating its terms and conditions.

Government sources had earlier claimed that the information provided by WhatsApp is more of a "technical jargon" which didn't give much information about victims and extent of such attacks. WhatsApp had informed users separately about possible Pegasus attack on their devices.

Similar to the Pegasus incident, this vulnerability is also being called "a stack-based buffer overflow vulnerability".

According to CERT, "The exploitation does not require any form of authentication from the victim end and executes on downloading of malicious mp4 file on victims system."

Courtesy: www.indiatoday.in

Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.



Bengaluru, Apr 07 (PTI): A court here on Monday extended the judicial custody of Kannada actress Ranya Rao, and two others until April 21 in connection with a gold smuggling case. Ranya, businessman Tarun Raju, and jewellery dealer Sahil Jain are accused of orchestrating the illegal import of gold worth over Rs 12.56 crore from Dubai to India.

The case came to light on March 3, 2025, when Rao alias Harshavardhani Ranya was apprehended at Bengaluru's Kempegowda International Airport with 14.8 kilograms of gold allegedly smuggled from Dubai. Subsequent investigations revealed that Ranya had made 45 solo trips to Dubai between 2023 and 2025, raising suspicions of her involvement in a broader smuggling network.

Further scrutiny uncovered her association with Vira Diamonds Trading, a Dubai-based firm she co-founded in 2023 with actor and businessman Tarun Raju. Authorities allege that this company was used as a front for smuggling operations. Raju, also known as Virat Konduru, was arrested following evidence of his involvement in purchasing gold in Dubai and facilitating its illegal transport to India.

Investigations also implicated jeweller Sahil Jain, who is suspected of assisting Ranya in selling approximately 49 kilograms of smuggled gold valued at over Rs 40 crore. Jain allegedly managed hawala transactions, transferring significant sums to Dubai, and received commissions for his role in the operations.

The Directorate of Revenue Intelligence (DRI) has presented substantial evidence linking the accused to the smuggling activities. The court previously denied bail to Raju, citing the serious nature of the economic offense and potential flight risk due to his frequent international travel history.

Get all the latest, breaking news from Karnataka in a single click. CLICK HERE to get all the latest news from Karnataka.