New WhatsApp bug via MP4 file triggers snooping concerns

Agencies
November 18, 2019

If someone has sent you an MP4 file on WhatsApp, guard against downloading it as hackers may use a critical vulnerability in the Facebook-owned app to execute snooping attack on both Android and iOS devices.

The specially crafted MP4 file triggers the remote code execution (RCE) and denial of service (DoS) cyber attack.

"The vulnerability is classified as 'Critical' severity that affected an unknown code block of the component MP4 File Handler in WhatsApp," reported gbhackers.com on Saturday.

Facebook has issued an advisory, saying "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user.

"The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE."

The news comes on the heels of an Israeli software Pegasus by cyber intelligence company NSO Group that exploited its video calling system to snoop on 1,400 selected users globally and in India, including human rights activists and journalists.

The issue snowballed into a political one and the Indian government denied either purchasing or planning to purchase the infamous software in question.

"We agree with the government of India's strong statement about the need to safeguard the privacy of all Indian citizens. That is why we've taken this strong action to hold cyber attackers accountable and why WhatsApp is so committed to the protection of all user messages through the product we provide," a WhatsApp spokesperson had said in a statement.

The new vulnerability is found in Android versions prior to 2.19.274; iOS versions prior to 2.19.100; Enterprise Client versions prior to 2.25.3; Business for Android versions prior to 2.19.104; Business for iOS versions prior to 2.19.100; and Windows Phone versions before and including 2.18.368.

Hackers can use the WhatsApp vulnerability to deploy the malware on the user's device to steal sensitive files and also used to surveillance purpose.

"The RCE vulnerability allows hackers to perform the attack remotely without any sort of authentication," claimed the report.

The critical WhatsApp vulnerability can be tracked as CVE-2019-11931.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 2,2020

Leiden, Jul 2: Astronomers have discovered a luminous galaxy caught in the act of reionizing its surrounding gas only 800 million years after the Big Bang.

The research, led by Romain Meyer, PhD student at UCL in London, UK, has been presented at the virtual annual meeting of the European Astronomical Society (EAS).

Studying the first galaxies that formed 13 billion years ago is essential to understanding our cosmic origins. One of the current hot topics in extragalactic astronomy is 'cosmic reionization,' the process in which the intergalactic gas was ionized (atoms stripped of their electrons).

Cosmic reionization is similar to an unsolved murder: We have clear evidence for it, but who did it, how and when? We now have strong evidence that hydrogen reionization was completed about 13 billion years ago, in the first billion years of the universe, with bubbles of ionized gas slowly growing and overlapping.

The objects capable of creating such ionized hydrogen bubbles have however remained mysterious until now: the discovery of a luminous galaxy in which 60-100 percent of ionizing photons escape, is likely responsible for ionizing its local bubble. This suggests the case is closer to being solved.

The two main suspects for cosmic reionization are usually 1) a population of numerous faint galaxies leaking ~10 percent of their energetic photons, and 2) an 'oligarchy' of luminous galaxies with a much larger percentage (>50 percent) of photons escaping each galaxy.

In either case, these first galaxies were very different from those today: galaxies in the local universe are very inefficient leakers, with only <2-3 percent of ionizing photons escaping their host. To understand which galaxies governed cosmic reionization, astronomers must measure the so-called escape fractions of galaxies in the reionization era.

The detection of light from excited hydrogen atoms (the so-called Lyman-alpha line) can be used to infer the fraction of escaping photons. On the one hand, such detections are rare because reionization-era galaxies are surrounded by neutral gas which absorbs that signature hydrogen emission.

On the other hand, if this hydrogen signal is detected it represents a 'smoking gun' for a large ionized bubble, meaning we have caught a galaxy reionizing its surroundings. The size of the bubble and the galaxy's luminosity determines whether it is solely responsible for creating this ionized bubble or if unseen accomplices are necessary.

The discovery of a luminous galaxy 800 million years after the Big Bang supports the scenario where an 'oligarchy' of bright leakers emits most of the ionizing photons.

"It is the first time we can point to an object responsible for creating an ionized bubble, without the need for a contribution from unseen galaxies.

Additional observations with the upcoming James Webb Space Telescope will enable us to study further what is likely one of the best suspects for the unsolved case of cosmic reionization," said Meyer.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 10,2020

In a first, the Supreme Court on Friday allowed the service of summons and notices, a necessity in almost all legal proceedings, through instant messenger like WhatsApp as well as by e-mail and fax.

A bench headed by Chief Justice SA Bobde observed that it has been brought to the notice of the court that it is not feasible to visit post offices for service of notices, summons, and pleadings. The bench also comprising Justices AS Bopanna and R Subhash Reddy observed that notice and summons should be sent through e-mail on the same day along with instant message through WhatsApp and other phone messenger services.

The bench clarified that all methods should be deployed for a valid service on the party. "Two blue ticks would convey that the receiver has seen the notice," noted the bench.

The bench declined the request of the Attorney General for specifically naming WhatsApp as a mode of effectuating service. The top court noted that it would not be practical to specify only WhatsApp. The apex court also permitted RBI to extend the validity of cheques in the backdrop of lockdown to contain the coronavirus outbreak.

Senior advocate V Giri representing RBI informed the bench that he had circulated the note regarding validity of a cheque as directions issued on the previous hearing.

The bench noted that it will be in discretion of the RBI to issue orders which are suitable to alter the validity of the period of a cheque.

During an earlier hearing on the matter on July 7, the Attorney General contended before the top court that the Centre had some reservations in connection with the utilization of mobile applications like WhatsApp and other apps for service of summons. The Centre's top law officer informed the apex court that these apps claimed to be encrypted, and they were not trustworthy.

The RBI counsel had contended before the top court that it was considering clarifying the validity of a cheque which has been reduced to 3 months from 6 months.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.