New WhatsApp bug via MP4 file triggers snooping concerns

Agencies
November 18, 2019

If someone has sent you an MP4 file on WhatsApp, guard against downloading it as hackers may use a critical vulnerability in the Facebook-owned app to execute snooping attack on both Android and iOS devices.

The specially crafted MP4 file triggers the remote code execution (RCE) and denial of service (DoS) cyber attack.

"The vulnerability is classified as 'Critical' severity that affected an unknown code block of the component MP4 File Handler in WhatsApp," reported gbhackers.com on Saturday.

Facebook has issued an advisory, saying "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user.

"The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE."

The news comes on the heels of an Israeli software Pegasus by cyber intelligence company NSO Group that exploited its video calling system to snoop on 1,400 selected users globally and in India, including human rights activists and journalists.

The issue snowballed into a political one and the Indian government denied either purchasing or planning to purchase the infamous software in question.

"We agree with the government of India's strong statement about the need to safeguard the privacy of all Indian citizens. That is why we've taken this strong action to hold cyber attackers accountable and why WhatsApp is so committed to the protection of all user messages through the product we provide," a WhatsApp spokesperson had said in a statement.

The new vulnerability is found in Android versions prior to 2.19.274; iOS versions prior to 2.19.100; Enterprise Client versions prior to 2.25.3; Business for Android versions prior to 2.19.104; Business for iOS versions prior to 2.19.100; and Windows Phone versions before and including 2.18.368.

Hackers can use the WhatsApp vulnerability to deploy the malware on the user's device to steal sensitive files and also used to surveillance purpose.

"The RCE vulnerability allows hackers to perform the attack remotely without any sort of authentication," claimed the report.

The critical WhatsApp vulnerability can be tracked as CVE-2019-11931.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
February 26,2020

New Delhi, Feb 26: With the government pushing for the disinvestment of Air India, industrial conglomerate Adani Group may emerge as one of the bidders for the debt-laden national carrier, sources said.

According to highly placed sources, the Group has held internal rounds of deliberations on whether or not to submit an Expression of Interest (EoI) and the discussions are still in the preliminary stage.

If the company actually submits an EoI, it would be a major move towards further diversification of the company which has business interests across sectors right from edible oil, food to mining and minerals. 

It also entered into airport operations and maintenance business and won bids for privatisation of six airports, Ahmedabad, Lucknow, Jaipur, Guwahati, Thiruvananthapuram and Mangaluru in 2019. 

On being contacted by IANS, the company did not comment on the matter.

Air India is one of the most important divestment proposals for the current fiscal to reach the huge Rs 2.1 lakh crore target.

The government in January restarted the divestment process of the airline and invited bids for selling 100 per cent of its equity in the state-owned airline, including Air India's 100 per cent shareholding in AI Express Ltd. and 50 per cent in Air India SATS Airport Services Private Ltd.

After its unsuccessful bid to sell Air India in 2018, the government this time has decided to offload its entire stake. In 2018, it had offered to sell its 76 per cent stake in the airline.

Of the total debt of Rs 60,074 crore as of March 31, 2019, the buyer would be required to absorb Rs 23,286 crore.

Air India, along with its subsidiary Air India Express, has a total operational fleet of 146 aeroplanes.

Further, the disinvestment department has extended the last date for submission of written queries on the Performance Information Memorandum and Share Purchase Agreement to March 6.

The last date for submission of written queries on PIM and SPA was originally set for February 11, following which the Department of Investment and Public Asset Management (DIPAM) on February 21 issued 20 clarifications on the queries raised and expected.

Any delay in the tentatively rolled out timeline would also delay DIPAM's plan to identify the pre-qualified bidders by March 31 and the financial bids invitation as well. It is expected to take more than two months after the selection of the pre-qualified bidders to complete Air India's sale.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

New Delhi, Mar 8: In order to spread awareness, a special COVID-19 mobile phone caller tune was launched by all telecom operators with basic infection prevention messages played when a caller dials-out, Ministry of Health and Family Welfare said on Saturday.

"In order to spread awareness about COVID-19, a special COVID-19 mobile phone caller tune was launched by all telecom operators. Over 117.2 crore subscribers of BSNL, MTNL Reliance Jio, Airtel and Vodafone-Idea are being progressively reached out to through SMSs and Call Backs," Ministry of Health and Family Welfare said in a press statement.

"As many as 52 laboratories are now operational across the country for testing the COVID-19 virus. An additional 57 laboratories have been provided with Viral Transport Media and swabs for sample collection," the statement added.

India has 39 confirmed cases of deadly coronavirus so far. The disease has caused deaths of 3200 people globally. 

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.