The discovery that hackers could snoop on WhatsApp should alert users of supposedly secure messaging apps to an uncomfortable truth: “End-to-end encryption” sounds nice — but if anyone can get into your phone’s operating system, they will be able to read your messages without having to decrypt them.
According to a report in the Financial Times on Tuesday, the spyware that exploited the vulnerability was Pegasus, made by the Israeli company NSO. The malware could access a phone’s camera and microphone, open messages, capture what appears on a user’s screen, and log keystrokes — rendering encryption pointless. It works on all operating systems, including Apple’s iOS, Google’s Android, and Microsoft’s rarely used mobile version of Windows.
The cybersecurity community has known about it for years, and activists have been raising hell about its use against dissidents and journalists in dozens of countries — although NSO itself says it doesn’t sell Pegasus to unsavory regimes and that it is disabled in the U.S.
It was previously assumed that for Pegasus to work, the intended victim had to click on a phishing link to install the malware. But according to a brief technical description of the hack posted by WhatsApp’s owner, Facebook Inc., it now appears hackers can install the malware simply by calling the target.
This isn’t the first vulnerability of this kind to be discovered in a supposedly secure messaging app. Last year, Argentinian security researcher Ivan Ariel Barrera Oro wrote about a flaw in Signal, an app favored by Edward Snowden. In that case, a hacker could send a specially crafted internet address in a Signal message and it would download the malware.
It’s important to realize, however, that spyware that can install itself without any action on the user’s part can arrive through any channel, be it an encrypted messenger, a browser, an email or SMS client with an undiscovered vulnerability allowing such an attack.
These are merely applications running on top of an operating system, and once a piece of malware gets into the latter it can control the device in a multitude of ways. With a keylogger, a hacker can see only one side of a conversation. Add the ability to capture a user’s screen, and they can see the full discussion regardless of what security precautions are built into the app you are using.
“End-to-end encryption” is a marketing device used by companies such as Facebook to lull consumers wary about cyber-surveillance into a false sense of security. Encryption is, of course, necessary, but it’s not a fail-safe way to secure communication.
Source: WhatsApp Hack Shows End-to-End Encryption Has a Vulnerability – Bloomberg