Cybersecurity experts have warned WhatsApp users to update the messaging app as soon as possible following the discovery of a major vulnerability that could allow attackers to install a malicious code on smartphones.
The Facebook-owned app said it identified and fixed the issue earlier this month but Citizen Lab, a research group at the University of Toronto, suspects that an attacker attempted to exploit it again on Sunday.
WhatsApp believes that a select number of users were targeted by an advanced cyber actor, exploiting its voice calling feature, which it said had all the hallmarks of a private company reportedly that works with governments to deliver spyware that takes over the functions of mobile phone operating systems.
“It demonstrates the importance of keeping your software updated,” said Budi Arief, a cybersecurity expert at the University of Kent.
“I’m not particularly surprised by this development, this happens all the time. This recent vulnerability bears a resemblance to the Apple FaceTime vulnerability discovered earlier this year. At this stage, it is too early to say whether there is any connection between the WhatsApp vulnerability and the FaceTime vulnerability. Software is a very complex system — it’s practically impossible to guarantee it is completely bug-free, there are always potential vulnerabilities that could be exploited.”
WhatsApp said it was deeply concerned about the abuse of such capabilities and is also urging users to update their apps out of an abundance of caution.
The company, which has some 1.5 billion users worldwide, has been in contact with a number of human rights organisations to share information on the incident, as well as US law enforcement to assist in conducting an investigation.
“WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” a spokeswoman said.
“We are constantly working alongside industry partners to provide the latest security enhancements to help protect our users.”
There are concerns that the software was used in attempts to access the phones of human rights campaigners, including a UK-based lawyer.
According to the Financial Times, the spyware was developed by NSO Group, an Israeli cybersecurity and intelligence company.
“Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies,” the company told the paper.
“NSO would not, or could not, use its technology in its own right to target any person or organisation, including this individual (the UK lawyer).”