Case Study (Method)

 An outline of the WhatsApp hacking technique utilised in May 2019 is provided below:

  1. Attackers made a phone call to the target's WhatsApp number by taking advantage of the voice calling feature. Even if the target didn't pick up the phone, the attacker might still take advantage of the weakness. 
  2. Buffer Overflow Vulnerability: During the conversation, the attackers delivered a series of specially designed binary code packets that caused WhatsApp to experience a buffer overflow vulnerability.
  3. Remote Code Execution: The attackers could run malicious code on the target device by making use of the buffer overflow vulnerability. This made it possible for them to covertly install surveillance software like the Pegasus spyware from the NSO Group.
  4.  Installation of spyware: After seizing control of the target device, attackers could remotely set up surveillance software to keep an eye on the device's activities, including calls, messages, and other data.
Reference:

Chambers, M., 2020. WRITING TECHNOLOGIES IN COMPARISON: SECURITY IN THE AGES OF TELEGRAMS AND WHATSAPP. Ashen Egg, p.19.

Comments

Popular posts from this blog

Academic Paper Summary

Software (Example) ALTERYX

Case Study (Conclusion)