San Francisco: A security flaw in WhatsApp, one of the most popular messaging apps in the world, allowed sophisticated attackers to install spyware on phones, the company said Tuesday, in the latest trouble for its parent Facebook.
The vulnerability -- first reported by the Financial Times, and fixed in the latest WhatsApp update -- allowed hackers to insert malicious software on phones by calling the target using the app, which is used by 1.5 billion people around the world.
The FT cited a spyware dealer as saying the tool was developed by a shadowy Israel-based firm called the NSO Group, which has been accused of helping governments from the Middle East to Mexico snoop on activists and journalists.
Security researchers said the malicious code bore similarities to other tech developed by the firm, according to The New York Times.
The latest exploit -- which impacts Android devices and Apple's iPhones, among others -- was discovered earlier this month and WhatsApp scrambled to fix it, rolling out an update in less than 10 days.
"WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices," a spokesperson said in a statement to AFP.
The firm did not comment on the number of users affected or who targeted them, and said it had reported the matter to US authorities.
The breach is the latest in a series of issues troubling WhatsApp's parent Facebook, which has faced intense criticism for allowing its users' data to be harvested by research companies and over its slow response to Russia using the platform as a means to spread disinformation during the 2016 US election campaign.
The WhatsApp spyware is sophisticated and "would be available to only advanced and highly motivated actors", the company said, adding that a "select number of users were targeted".
"This attack has all the hallmarks of a private company that works with a number of governments around the world" according to initial investigations, it added, but did not name the firm.
WhatsApp has briefed human rights organizations on the matter, but did not identify them.
The Citizen Lab, a research group at the University of Toronto, said in a tweet it believed an attacker tried to target a human rights lawyer as recently as Sunday using this flaw, but was blocked by WhatsApp.
The NSO Group came to prominence in 2016 when researchers accused it of helping spy on an activist in the United Arab Emirates. Its best-known product is Pegasus, a highly invasive tool that can reportedly switch on a target's phone camera and microphone, and access data on it.
The firm said Tuesday that it only licenses its software to governments for "fighting crime and terror".
The NSO Group "does not operate the system, and after a rigorous licensing and vetting process, intelligence and law enforcement determine how to use the technology to support their public safety missions", it said in a statement to AFP.
"We investigate any credible allegations of misuse and if necessary, we take action, including shutting down the system.
Let the Truth be known. If you read VB and like VB, please be a VB Supporter and Help us deliver the Truth to one and all.
Bengaluru: Vidyaranyapura police have arrested four persons, including a man posing as a Police Sub-Inspector (PSI), for allegedly breaking into a house, threatening the occupants, and extorting money while wearing police uniforms.
The arrested accused have been identified as Mallikarjuna, Pramod, Vinay, and Hrithik.
Police said the accused had hatched a plan to pose as police personnel, conduct fake raids, and extort money from residents by intimidation.
ALSO READ: Bantwal police arrest two men for illegal sale of narcotics, seize two vehicles, 810 gm ganja
According to the police, Mallikarjuna had failed the PSI examination twice and later falsely projected himself as a PSI. He allegedly conducted photo shoots in his hometown, Siraguppa, wearing a police uniform, baton, cap, and shoes, claiming to be serving as a PSI in Bengaluru.
On December 7, the four accused allegedly went to the house of Naveen in the Vidyaranyapura limits, threatened him with a stick and an iron rod, and claimed they had information that he was selling ganja. Under the pretext of searching, they allegedly extorted ₹87,000 through bank transfer, ₹53,000 in cash kept in the house, and ₹2,000 from his wallet.
Following Naveen’s complaint, Vidyaranyapura police registered a case and launched an operation, leading to the arrest of all four accused. Police have seized ₹45,000 in cash and the car used to commit the crime.
Further investigation is underway.
