Zero-days for hacking WhatsApp are now worth millions of dollars
Reading Time: 2 minutesLast week, a Russian company that buys zero-days — flaws in software that are unknown to the developer of the affected product — offered $20 million for chains of bugs that would allow their customers, which the company said are ‘Russian private and government organizations only,’ to remotely compromise phones running iOS and Android. That price is in part likely caused by the fact that there aren’t many researchers willing to work with Russia while the invasion of Ukraine continues, and that Russian government customers are likely willing to pay a premium under the current circumstances.
But even in the markets outside of Russia, including just for bugs in specific apps, prices have gone up.
‘They’ve shot up,’ said a security researcher who has knowledge of the market, and asked to remain anonymous as they weren’t authorized to speak to the press.
WhatsApp has been a popular target for government hackers, the kind of groups that are more likely to use zero-days. In 2019, researchers caught customers of the controversial spyware maker NSO Group using a zero-day to target WhatsApp users. Soon after, WhatsApp sued the Israeli surveillance tech vendor, accusing it of abusing its platform to facilitate its customers using the zero-day against more than a thousand WhatsApp users.
In 2021, according to one of the leaked documents, a company was selling a ‘zero click RCE’ in WhatsApp for around $1.7 million. RCE is cybersecurity lingo for remote code execution, a type of flaw that allows malicious hackers to remotely run code on the target’s device. Or in this case, inside WhatsApp, allowing them to monitor, read and exfiltrate messages. ‘Zero click’ refers to the fact that the exploit requires no interaction from the target, making it stealthier and harder to detect.
The document said the exploit worked for Android versions 9 to 11, which was released in 2020, and that it took advantage of a flaw in the ‘image rendering library.’ In 2020 and 2021, WhatsApp fixed three vulnerabilities — CVE-2020-1890, CVE-2020-1910 and CVE-2021-24041 — that all involved how the app processes images. It’s unclear if these patches fixed the flaws underlying the exploits that were on sale in 2021.
WhatsApp spokesperson Zade Alsawah said the company declined to comment.
The value of targeting WhatsApp specifically is that, sometimes, government hackers — think those working for intelligence or law enforcement agencies — may only be interested in a target’s chats on WhatsApp, so they don’t need to compromise the whole phone. But an exploit only in WhatsApp can also be part of a chain to further compromise the target’s device.
‘The exploit buyers are interested in the exploits for what they enable — spying on their targets,’ said a security researcher with knowledge of the market, who asked to remain anonymous to discuss sensitive issues. ‘If the exploit they buy does not give them all of what they want they need to buy multiple pieces and combine them.’
Ref: techcrunch
MediaDownloader.net -> Free Online Video Downloader, Download Any Video From YouTube, VK, Vimeo, Twitter, Twitch, Tumblr, Tiktok, Telegram, TED, Streamable, Soundcloud, Snapchat, Share, Rumble, Reddit, PuhuTV, Pinterest, Periscope, Ok.ru, MxTakatak, Mixcloud, Mashable, LinkedIn, Likee, Kwai, Izlesene, Instagram, Imgur, IMDB, Ifunny, Gaana, Flickr, Febspot, Facebook, ESPN, Douyin, Dailymotion, Buzzfeed, BluTV, Blogger, Bitchute, Bilibili, Bandcamp, Akıllı, 9GAG