Is the popular messaging service Whatsapp affected by a backdoor? According to a blog post published by The Guardian, the application was affected by a vulnerability that could be exploited by attackers to intercept and read messages.
The issue could not be considered as a backdoor either a vulnerability, it is an issue related to the implementation of the cryptography in the app, in the specific case of user’s encryption key changes.
Even when a new key is generated, for example using a new device, the user will be able to continue an old conversation without informing the sender of the change. Anyway, specific settings in Whatsapp can enable the notification that the sender transmitted message using a new Key.
The security issue was discovered by Tobias Boelter, a cryptography and security researcher at the University of California, Berkeley.
“If WhatsApp is asked by a government agency to disclose its messaging records, it can effectively grant access due to the change in keys.” Boelter told the Guardian
Resuming the issue is a serious threat to the users’ privacy, WhatsApp can read encrypted messages sent through the service.
The researcher reported the flaw to WhatsApp in April, but the loophole is still present.
Boelter highlights WhatsApp by default trusts the use of new key without any sender’s notification, he also remarked that the application notifies the sender of the change only after the message is sent even when that default is changed.
On the other end, the application Signal, for example, requires a sender to manually verify keys, WhatsApp doesn’t.
The notorious Moxie Marlinspike, who is considered the mind behind the encryption protocol behind both Signal and WhatsApp explained that the issue could not be considered as a backdoor.
“The fact that WhatsApp handles key changes is not a ‘backdoor,'” reads a blog post published by Moxie. “It is how cryptography works. Any attempt to intercept messages in transmit by the server is detectable by the sender, just like with Signal, PGP, or any other end-to-end encrypted communication system.”
Moxie highlighted that WhatsApp takes strict precautions to prevent its servers from knowing which users have enabled security notifications. This means that it should be impossible for attackers to gather information about potential victims that turned off the notification.
Boelter highlighted that an attacker can hack WhatApp servers and gain administrative control over them.
The attacker could force a change of the encryption key for a targeted mobile device allowing the application to use his key to encrypt messages without ever warning the receiver.
The attacker then has to take the targeted phone temporarily unavailable (for a period of hours or days). All the messages that were sent during that time will be stored in a queue and once the phone became available again, the messages will be encrypted with the new attacker key.
The attack anyway is very complex from the attacker perspective because:
Which is the WhatsApp reply?
“WhatsApp does not give governments a “backdoor” into its systems and would fight any government request to create a backdoor. The design decision referenced in the Guardian story prevents millions of messages from being lost, and WhatsApp offers people security notifications to alert them to potential security risks. WhatsApp published a technical white paper on its encryption design and has been transparent about the government requests it receives, publishing data about those requests in the Facebook Government Requests Report.” states WhatsApp
“Ultimately, there’s little evidence of a vulnerability and certainly none of a backdoor—which is usually defined as secret functionality for defeating security measures. WhatsApp users should strongly consider turning on security notifications by accessing Settings > Account > Security.”
(Security Affairs – Backdoor, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.