Skip to main content

How Spammers Can Change The Messages You've Sent : Whatsapp Update

This latest WhatsApp update is the stuff of nightmares; a recently-discovered glitch could allow a third-party to completely change the text you’ve sent.
It’s bad news for the application, which prides itself on secrecy. Their “end-to-end” encryption tools keep the contents of your messages locked solely between you and your recipients. However, Check Point Research have discovered how scammers can circumvent this usually tight security feature.


“We recently unveiled new vulnerabilities in the popular messaging application that could allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.”

WhatsApp update: How are my messages manipulated?


Through a super-complicated decryption process, a user with malicious intent can target their victim by using one of the following three methods:
Change the identity of a message’s sender by using the “quote feature”.
Alter what somebody has already written so it appears as something different for the recipient.
It can also make your private messages public within a group chat. That could be fatal.
The potential scenarios are frightening. Messaging your boss for something quick? That could be manipulated to make it look like you’ve told them to stuff the job.
Got some news you need to keep secret from friends and family? Well, that could be appearing on their screens just seconds after you thought you’d shared it solely in confidence.

How does it work?

In these situations, the attacker is able to manipulate the chat by sending a message back to themselves on behalf of the other person, as if it had come from them. By doing so, it would be possible to incriminate a person, or close a fraudulent deal, for example.
The implications are devastating for WhatsApp, who are now working to prevent this loophole being used for mischevious purposes. Check Point Research have shared all their findings with the Facebook-owned giants, and a resolution will be welcome sooner rather than later.
We won’t even pretend to know how high-level hacking works, which is why we’ve got a video on-hand to demonstrate how this security glitch can be exploited. If you’re a tech whizz, there’s also a step-by-step process of how it’s done here.

Watch how hackers can change your WhatsApp messages here(Video Not By Us):


Comments

Popular Posts

Wireguard On Kali Linux

What Is Wireguard? Wireguard is a open-source software application and protocol that implements Virtual Private Network (VPN) Techniques to create secure point-to-point connections in routed or bridged configurations. It is run as module inside the linux kernel and aims for better  performance than IPsec and openvpn tunneling protocols. Getting Started With Wireguard On Kali Linux - As Wireguard is  added to kali linux repositories, it can be simply Installed with terminal - apt install wireguard resolvconf As the installation completes, next step is to configure wireguard to use it. So, We Need To generate public/private key pair and set up initial config file - wg genkey | tee privatekey | wg pubkey > publickey umask u=rwx,go= && cat > /etc/wireguard/wg0.conf << EOF [Interface] Address = 10.222.222.1/24 SaveConfig = true ListenPort = 51820 PrivateKey = -SERVER PRIVATE KEY- [Peer] PublicKey = -CLIENT PUBLIC KEY- AllowedIPs = 10.2...

How To Play Android Games on PC

How To Play Android Games on your PC Smartphone Gaming is becoming new trend with the increase of quality, graphics, and types of games available on the app store. But Some People face issues like the small screens of smartphones, as they want a bigger screen, better controls and a better performance, So they want to play games on PC but  all the games aren't available on windows so How can we do so? Luckily, We have a way to Do So... The Best Way to do So Is to use the Android Emulator on PC. There are not much options available in the list but Bluestacks 3 is the one well known name in the field. Let's Jump on to the process to use it. Note:- Performance of Games on Emulator Depends on the specifiations of PC you are using. Setting Up The Bluestacks 3 Installing Bluestacks 3 is a very Easy Process. You Need to Download the Bluestacks Offline installer f rom the official  Bluestacks  website and run it. The Program is quite large (approx 500MB) and may take fe...

How To Detect Intruders on your WiFi Network

We live an era where people use various techniques to use a WiFi network, May be for free data or to steal personal information. So we want to see the list of peoples using our network, So let's see how to do it. It's a very easy task to do so, You Just Need To have an Android or an iPhone and download a app Named "Fing - Network Tools" from The App Store and You can have a lot of information about the network and connected devices. So Here We are using android play store to explore the app, So you can download the  Fing - Network Tools  From The Google Play Store on Your Android Phone Let's have a brief view of stuff we can do with this app - It Can List The Name Of Devices Which are Connected to your WiFi Network or Which were connected to you WiFi Network in past   Type of Devices i.e.They are mobile or laptop devices, The Above Screenshot shows how the Type indicated with Logo of Mobile or Laptop. The Name Of The Vendor Can Also Be Seen On The Righ...