OMG !! Threat to whatsapp....
It's not clear
what value hackers might find in perusing the chats of WhatsApp users, but
that's small comfort to those who'd rather not expose their private
conversations. An Android developer presented a proof of concept showing how
the deed could be done, but there's no reason to believe that any thieves have
penetrated the WhatsApp vault. It could mean a snag in Facebook's acquisition
deal.
An Android developer's disclosure that it's possible to hack into the WhatsApp database and
read the text of the chats from another application could be a big headache for
Facebook, which has agreed to purchase the app for US$19 billion.
"This is not a bug, but a design decision of WhatsApp," Bas
Bosschert, chief technology officer of Double Think, told
LinuxInsider.
"They selected for usability in their design, not security," he
continued. "I didn't find anything new -- I only showed how people could
abuse this flaw with a working proof of concept."
The flaw works if the database backup capability is enabled, which it
apparently is by default, commenters on Bosschert's blog post said.
Although WhatsApp had encrypted its database in February, that encryption
is available only in new installations, and updates still use the old,
unencrypted version, Bosschert remarked.
Facebook and WhatsApp did not respond to our request to comment for this
story.
How the Hack Works
The process seems straightforward -- Bosschert created a PHP script to
store the database on a Web server, created an Eclipse project with some
additional lines in the AndroidManifest.xml file, and grabbed the mststore.db
and wa.db WhatsApp files, which are unencrypted.
His application displayed a simple loading screen during that process so
users wouldn't notice their WhatsApp database was being pilfered.
The hack is possible because the WhatsApp database used to be written in
SQLite3. Openssl apparently also could be used to hack the database.
Although it appears WhatsApp encrypted the msgstore.db database using the
.crypt utility, it's still possible to read chats from the encrypted database
by creating a simple Python script, which converts it to a plain SQLite 3
database.
Keeping Chats Safe
Bosschert obtained the database's AES key by using the WhatsAppXtract tool published in the XDA
Developers' Forum. That key no longer works with the encrypted database,
according to TiFlo Software, which claims its statistical app cracks the
encryption.
"Given the nature of the WhatsApp use model, with backup enabled by
default, you could argue that the hack is a key to a treasure house of
information ... [but] I personally doubt it," Charles King, principal
analyst at Pund-IT,
told LinuxInsider.
"Given the size of WhatsApp's user base and how popular the app is
among young people, finding anything of value would likely be comparable to
searching for a needle of enlightenment in digital haystacks of teenaged
trivia," King continued.
The Impact on Facebook
The impact of the hack on Facebook's purchase of WhatsApp likely will be
minimal at worst.
"It will take something like the Target hack, where millions of people
lost their credit card information, to have an impact on the deal," Jim
McGregor, founder and principal analyst atTirias
Research, told LinuxInsider.
"That will eventually happen as electronic wallets and other
applications emerge, but for now it's going to be another of those 'there's
another issue, go fix it' things for Facebook, which is a company that's known
for sharing user information anyway."
Still, users "will be screwed if WhatsApp doesn't think of a
backwards-compatible solution so existing databases can be converted to a
secure implementation," Bosschert said.
Given that competition in the chat apps market is keen and some WhatsApp
users have fled to other apps like Viber in the wake of the Facebook purchase,
perhaps the situation should not be taken too lightly
Comments
Post a Comment