Introduction
WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The web application mirrors all messages sent and received, and fully synchronize your phone and your desktop computer so that users can see all messages on both devices.
WhatsApp Web is available for most WhatsApp supported platforms, including Android, iPhone (iOS), Windows Phone 8.x, BlackBerry, BB10 and Nokia smartphones. In September 2015, WhatsApp announced they had reached 900 million active users a month. At least 200M are estimated to use the WhatsApp Web interface, considering publicly available web traffic statistics.
Executive Summary
Check Point security researcher Kasif Dekel recently discovered significant vulnerabilities which exploit the WhatsApp Web logic and allow attackers to trick victims into executing arbitrary code on their machines in a new and sophisticated way. All an attacker needed to do to exploit the vulnerability was to send a user a seemingly innocent vCard containing malicious code. Once opened, the alleged contact is revealed to be an executable file, further compromising computers by distributing bots, ransomware, RATs, and other malwares.
To target an individual, all an attacker needs is the phone number associated with the account.
WhatsApp verified and acknowledged the security issue and have deployed the fix in web clients world-wide. To make sure you are protected, update your WhatsApp Web right now.
Check Point shared its discovery to WhatsApp on August 21, 2015. On August 27, WhatsApp rolled out the initial fix (in all versions greater than 0.1.4481) and blocked that particular feature.
Technical Details
WhatsApp Web allows users to view any type of media or attachment that can be sent or viewed by the mobile platform/application. This includes images, videos, audio files, locations and contact cards.
The vulnerability lies in improper filtering of contact cards, sent utilizing the popular ‘vCard’ format. This is a screenshot for a possible contact vCard sent by a malicious user:
As you can see, this message (contact card) appears legitimate, like any other contact card; most users would click it immediately without giving it a second thought.
The implication of this innocent action is downloading a file which can run arbitrary code on the victim’s machine:
An Initial Hole
During Kasif’s research, he found that by manually intercepting and crafting XMPP requests to the WhatsApp servers, it was possible to control the file extension of the contact card file.
He first changed the file extension to .BAT, which indicates a Windows batch (executable script) file:
This means, once the victim clicks the downloaded file (which he assumes is a contact card), the code inside the batch file runs on his computer.
Let’s see what’s inside the downloaded file (i.e. the batch file):
This is a standard vCard format. To run malicious code, Kasif found out an attacker could simply inject a command to the name attribute of the vCard file, separated by the ‘&’ character. When executed, Windows will attempt to run all lines in the files, including our controlled injection line.
Further research showed that no XMPP interception of crafting is needed for this attack, since any user can create such a contact with an injected payload on their phones, no hacking tools necessary:
Once such a contact is created, all an attacker has to do is share it via the normal WhatsApp client.
But can we take it to the next level? Could we possibly discover a way to share malicious PE (.exe) files through WhatsApp’s default sharing features (no external links)?
To answer that, we have to examine WhatsApp’s communication protocols; WhatsApp uses a customized version of the open standard Extensible Messaging and Presence Protocol (XMPP).
This is how vCard messages appear over-the-wire (with some reconstruction) when sent using WhatsApp’s protocol:
- NUMBER/GROUPID: the victim’s number or group ID
- ID: the message ID
- TIMESTAMP: the timestamp of the sender device
- FILENAME: the VCARD file name, <something>.exe
- FILEDATA: the raw data of the file
We were surprised to find that WhatsApp fails to perform any validation on the vCard format or the contents of the file, and indeed when we crafted an exe file into this request, the WhatsApp web client happily let us download the PE file in all its glory:
But wait, there’s more! Clever attackers can exploit this in more devious scenarios, using the displayed icon to enrich the scam:
This simple trick opened up a vast world of opportunity for cybercriminals and scammers, in effect allowing easy “WhatsApp Phishing”. Massive exploitation of this vulnerability could have affected millions of users, failing to realize the malicious nature of the attachment.
Disclosure Timeline
- August 21, 2015 – Vulnerability disclosed to the WhatsApp security team.
- August 23, 2015 – First response received.
- August 27, 2015 – WhatsApp rolls out fixed web clients (greater than v0.1.4481)
- September 8, 2015 – Public disclosure
Conclusions
“Thankfully, WhatsApp responded quickly and responsibly to deploy an initial mitigation against exploitation of this issue in all web clients, pending an update of the WhatsApp client” said Oded Vanunu, Security Research Group Manager at Check Point. We applaud WhatsApp for such proper responses, and wish more vendors would handle security issues in this professional manner. Software vendors and service providers should be secured and act in accordance with security best practices.
Check Point continues to be on the lookout for vulnerabilities in common software and Internet platforms, disclosing issues as they are discovered, protecting consumers and customers against tomorrow’s threats.”










Hira Mughal says:
Is it fixed? Anyway I would suggest all users to get latest upgrade of their app
CAT Admit Card says:
I believe the bug has been fixed now. There were many updates pushed after that. Thanks to the author.
us open live stream says:
This is to inform you that US Open Live Stream is going on from aug 29 to 11 sep 2016. You way watch here.
Eric says:
Hey there,
the code isn’t executed right away; the user has to click on the .bat first, don’t they? So the browser’s sandbox is still in place, eh?
Best
Eric
Oded Vanunu says:
Hi Eric,
actually we weaponize it to execute PE(.exe) file, in addition we controlled the usability of the Vcard that will look legitimate & trusted.
The exe will run on the context of the OS and not the browser which make it more severe (no need to bypass browser sandboxing).
cheers, Oded
Govt jobs says:
Nice information provided by author. Really enjoyed reading it.
magicprix says:
Today whats-app is being use by millions of users worldwide. After find this threats it little bit possibilities that many users may has suffered from this vulnerabilities. Buy i hope it have been secure by whatsapp security team because find that no it has been secure. So thanks to whatsapp team.
palagiri khadarbasha says:
Fix the golden bug first
TNPSC 813 Village Administrative Officer Recruitment 2015 says:
Good information given by author, thanks for the post…………
RRB Railway Non Technical ASM TA Recruitment 2016 says:
Awesome article prepared by author about WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users……..
Lakshya Dhillon says:
awesome thanks…
sbothai says:
Howdy! Someone in my Facebook group shared this website with us so I
came to check it out. I’m definitely enjoying the information. I’m
book-marking and will be tweeting this to my followers!
Exceptional blog and fantastic design and style.
freedom apk says:
Good information given by author, thanks for the post.Loved reading it
kuldeep Singh says:
thans for sharing it
raja says:
I’ve been surfing online yet I never found any information like yours article its happens best if all the blogger write some unique things like you blog….we got something else which is never expected… :)
Cara Iki says:
Hiya very nice site!! Guy .. Excellent .. Superb .. I’ll bookmark your blog and take the feeds also¡KI’m satisfied to search out so many helpful info here within the put up, we’d like work out extra strategies on this regard, thanks for sharing. . . . . .
Somnath says:
Thanks you so much for this great article. Whatsapp has finally brought in end to end encryption. Hope you guys are aware of it. It means no third party can see your conversations. I think its a very good move. What say??
Yogesh says:
In my opinion end-to-end encryption isn’t full proof as well? File sharing documents may be the exploited next. Thanks for this information.
Inspirational Quotes says:
Thanks for sharing.
Jobs in Pakistan says:
Thank you for sharing
RonMarvelel says:
thanks for the info!!
dark souls 3 says:
Hey! I have recently started following you and every post of yours inspires me to make stuff on my own. Thanks a lot! It’s a great post.
emoji says:
Well this article that i’ve been waited for so long. I need this article to complete my assignment in the college, and it has same topic with your article. Thanks, great share.
happy birthday Wishes says:
Great blog here with all of the valuable information you have. Keep up the good work you are doing here.
friendship day image says:
Nice thought.Thanks for posting here.
Raj says:
Nice information, Thanks for sharing!
Jobsrelease.in says:
Really this is very helpful information compare to other posts! Thank you for this post.
video marketing books says:
Greetings from Ohio! I’m bored to tears at work so I decided to browse your
blog on my iphone during lunch break. I really like the info you present here and
can’t wait to take a look when I get home. I’m amazed at how quick your blog loaded on my phone ..
I’m not even using WIFI, just 3G .. Anyways, awesome blog!
Hot Actress Look says:
Nice information given by author, thanks for the post. Awesome
new year 2017 wallpaper says:
thanks for your post
selfie captions says:
Thank you for sharing. This is really a helpful post.
Independence Wishes says:
Greetings from Ohio! I’m bored to tears at work so I decided to browse your
blog on my iphone during lunch break. I really like the info you present here and
can’t wait to take a look when I get home. I’m amazed at how quick your blog loaded on my phone ..
I’m not even using WIFI, just 3G .. Anyways, awesome blog!
Literaturereviewhelp.com says:
Thanks a lot for letting us know about this security concern that hackers can use to hack a WhatsApp user’s device. We are really happy to hear that this problem has finally been resolved. I will keep coming back for more of your posts.
Jaey says:
I too agree. He has explained very well about the vulnerability!
happy friendship day says:
Pretty nice information. it has a better understanding. thanks for spending time on it
game says:
Very efficiently written story. It will be useful to anyone who utilizes it, including yours truly :).
Keep up the good work – can’t wait to read more posts.
Funny Pumpkin Carving Designs says:
Great information shared, thank you so much!
Happy New Year 2017 Photos says:
But whatsapp had end to end security encryption .
NewYear Girl says:
Thanks so much for taking your time to fully details this.. You are awesome
Regards
Jessy
EventXL
Bob says:
thanks.. great one
Ocean of games says:
Pretty nice information. it has a better understanding. thanks for spending time on it
Desert Safari Dubai says:
Nice article.
Dubai Visa for Indians says:
Great Information
app says:
You can redownload songs on your iPhone or iPod touch, iPad, Mac or PC. You can listen to previously
purchased song on your Apple TV, but they don’t download to your device.
العاب تلبيس حقيقية says:
THis is amazing thnx
lil yachty bio says:
thanks for this nice piece of sharing through it. It is very useful to make use of such details.
Concerned User says:
Wow…I didn’t know that WhatsApp could be so volitaile! I’m concerned about privacy more so than ever now! Jeeeeezzzzz….
Free Money says:
This is very good article for watzzup I was have this problem.
New Year 2017 Wallpapers says:
It will be useful to anyone who utilizes it, including yours truly :). Keep up the good work
sherine nim says:
Hey..nice update.. keep sharing awesome updates..love this awesome article.. keep sharing…more cool.. :) P)
new year quotes says:
nice post mate thanks for this.
Birthday Clipart says:
Thank you for sharing this topic.
ranveerkapoor says:
great post really appreciable work. That will be valuable to everyone who uses it, including myself. Many thanks!
happy diwali says:
good article
box office collection says:
this is grerat
Free Clipart says:
Great information. it has a better understanding. thanks for spending time on it.
Clipart and Backgrounds says:
Thank you so much for sharing! I enjoyed!
Vishal says:
Nice information sharing.
Download Film Terbaru says:
Hiya very nice site!! Guy .. Excellent .. Superb .. I’ll bookmark your blog and take the feeds also¡KI’m satisfied to search out so many helpful info here within the put up, we’d like work out extra strategies on this regard, thanks for sharing. . . . . .
Austin Jose says:
First of all i am saying that i like your post very much.I am really impressed by the way in which you presented the content and also the structure of the post. Hope you can gave us more posts like this and i really appreciate your hardwork.
jio 4g speed says:
I simply could not leave your web site prior to suggesting that I extremely loved the standard information a person supply to your guests?
Is going to be back ceaselessly in order to check out new posts
car images says:
Greetings from Alabama! Thank you for sharing!
Fotobu says:
Nice information. Thanks!
Rohit says:
Nice, Thanks for sharing
Rohit Dangar says:
nice thanks for sharing
Merry Christmas 2017 says:
I found so many interesting stuff in your blog especially its discussion .
Very useful post. This is my first time i visit here.
Really its great article. Keep it up!
Valentines Day 2017 Images and quotes says:
Such an Informative Post Man! Sharing it :)
Makar Sankranti 2017 says:
It’s wonderful post! Thanks for sharing it with US! Keep Sharing!
clipart says:
Nice post thank you for sharing!
happy valentines day says:
thanks for the awesome post written here. keep it up
Happy Mother's Day 2017 says:
Thanks for sharing, bingo!
pulau baliku says:
niche thanks good
birthday wishes says:
nice
silk brocade blouse says:
Much appreciated you all that much to share these connections. Will look at this..
Happy Valentines Day says:
nice
Salomon Speedcross 3 says:
Today whats-app is being use by millions of users worldwide. After find this threats it little bit possibilities that many users may has suffered from this vulnerabilities.
Salomon Chaussures says:
thanks for the awesome post written here.
kissdayimages says:
nice job for site