WhatsApp chats not as secret as you think

  • 13 March 2014
  • 3 replies
  • 6 views

Userlevel 7

Malicious apps can steal chat history

By Richard Chirgwin, 13 Mar 2014 Mark Zuckerberg's $19bn darling, WhatsApp, isn't as secure as we thought: a Dutch researcher has found that chats can be accessed and read by other apps.
 
Bas Bosschert has described a process by which the chat database can be read even if it's encrypted. His proof-of-concept, here, runs through the process.
 Here's the short version: Bosschert first created a php Web server to run on the target device, then with a bit more code work, he uploaded the WhatsApp message files to his own app – msgstore.db and wa.db for older versions, msgstore.db.crypt for newer versions.
 
If an attacker was to “combine it with something like FlappyBird and a description how to install applications from unknown sources,” he writes, “you can harvest a lot of databases”.
 
http://regmedia.co.uk/2014/03/12/whatsapp_theft.pngBas Bosschert has worked out how to read WhatsApp stored chats
 
For unencrypted stores, the work's already done. For newer versions of WhatsApp, he writes, decryption is already available from the WhatsApp Xtract backup tool.
 
For Bosschert's attack to work, all that's required is that the user grants sufficient permissions to the malicious app. As he writes: “ since [the] majority of the people allows everything on their Android device, this is not much of a problem.” ®
 
 
Full Article

3 replies

Userlevel 7
Badge +52
WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsAppwhich can be exploited to gain access to the private chats of Android device owners.   

 

The recent acquisition of WhatsApp by Facebook has done much to discuss, ever a price so high was paid for an app, but major concerns relate to users’ privacy. The security consultant Bas Bosschert recently identified a vulnerability in WhatsApp that could be exploited to gain access to the private chats by Android device users.
The security expert has discovered that any Android app that’s allowed access to the SD card installed on the handset can be exploited to access private conversations. In his blog post titled “Steal WhatsApp database (PoC)” Bosschert explained that all user’s chat on Android devices are stored in a database file (msgstore.db) on the SD card, he has also developed a proof-of-concept which demonstrates that any app that’s granted permission to access the card can easily access the database and steal it, for example uploading the file to a remote server. The WhatsApp database is a SQLite3 archive, which can be easily converted to Excel.
“The WhatsApp database is saved on the SD card which can be read by any Android application if the user allows it to access the SD card. And since the majority of the people allows everything on their Android device, this is not much of a problem.”
Bosschert has evidenced that  in newer versions of WhatsApp, the database filemsgstore.db is encrypted and this implies that the attackers have to decrypt it to access users’s private chats of Android. Decrypt the database is not a problem because the decryption key can be found in WhatsApp Xtract, another mobile app designed to allow users to create backups of WhatsApp conversations.
“In newer versions WhatsApp decided to do some crypto magic on their database (msgstore.db.crypt), so it is more secure. It is still possible to readchats from this database, but more on that later. The msgstore.db and wa.dbare the old unencrypted databases of WhatsApp.” states the researcher. “Lately WhatsApp is using encryption to encrypt the database, so it can no longer be opened by SQLite.  But we can simply decrypt this database using a simple python script. This script converts the crypted database to a plain SQLite3 database (got key from Whatsapp Xtract).” he added.
In the Bosschert’s POC during the database theft, the victim only sees a simple loading screen, the researcher reminds us that cybercriminals could combine the data-stealing code with a popular application, like a viral game, to harvest a large number of databases.
“By doing the magic in the loading screen you can also add this code to a real application instead of the Hello World message you see now. Combine it with something like FlappyBird and a description how to install applications from unknown sources and you can harvest a lot of databases. “
Bosschert reached out to WhatsApp, he will update his post if the company will respond to my inquiry.
This is the last privacy/security issue related to WhatsApp instant messaging platform, in the past Google removed from the official Play store the ”Balloon Pop 2? Android game that allows WhatsApp conversations snooping and last month February, security experts at Praetorian discovered different security issues in the way WhatApp implements SSL, the principal one is the lack of enforcing the “certificate pinning“.
In time I’m writing, WhatsApp denied any responsibilities, according the company the issue is related to the phone sustaining that anyway users are at risk downloading a malware or a dodgy app which might expose data on the microSD card.
Here’s the official statement from WhatsApp:
“We are aware of the reports regarding a “security flaw”. Unfortunately, these reports have not painted an accurate picture and are overstated. Under normal circumstances the data on a microSD card is not exposed. However, if a device owner downloads malware or a virus, their phone will be at risk. As always, we recommend WhatsApp users apply all software updates to ensure they have the latest security fixes and we strongly encourage users to only download trusted software from reputable companies. The current version of WhatsApp in Google Play was updated to further protect our users against malicious apps.”
 
Source
Userlevel 7
Thanks Guys!
 
Well.., after reading these news at all I don't regret that I don't use WhatsApp.
Userlevel 7
Badge +62
Yeh I agree with you Miguel , I had an instinct that whatsapp wasn't secure and never trusted it for some reason and now we know from previous posts by Baldrick and Petr. it's got issues!

Reply