Some of the latest news regarding WhatsApp vulnerabilities are relating to a manipulation of the WhatsApp protocol using a tool built by Check Point Research in order to validate WhatsApp security without jeopardizing WhatsApp end to end encryption.
This tool allows a user to modify WhatsApp messages before being sent and change the general parameters, such as participant’s phone number.
In the blog post ( we discussed how a threat vector could manipulate messages to their own advantage. In this blog post we will further investigate how a threat vector can use the tool in order to obstruct access to WhatsApp messenger for a group of users by causing a crash-loop.
The bug was discovered in August 2019 and responsibly reported to WhatsApp whose developers fixed the bug in the update for version 2.19.246 and onwards.
Read More:
0 Comments