The hackers used or exploited the buffer overflow vulnerability inside the application. WhatsApp had said that it fixed the vulnerability quickly as soon as the attack was noticed. A buffer overflow issue occurs when an application is overloaded with data in its buffer/ temporary storage space. When the app overloads, it starts storing the extra amount of data to the adjacent storage which in turn corrupts the earlier data held there by overwriting it. This causes the application to crash, corrupt or open a way for the hackers/ external parties to enter into the app/ system. In WhatsApp’s case, the hackers exploited the same buffer overflow flaw within the app’s call feature to install spyware into the smartphones without the knowledge of the user. The security flaw was in the calling feature of WhatsApp and it got activated once the user initiated or received a call even if he didn’t answer the call or it didn’t connect. WhatsApp’s calling feature uses the Voice over Internet Protocol (VoIP) similar to many applications which uses the internet for calling instead of the standard telephone lines. According to Business Insider, when the user receives a telephone call on WhatsApp, the application sets up the VoIP transaction and the encryption which goes with it. The application then notifies the user about the incoming call and he then can choose to accept, decline or ignore the call.

The code used in WhatsApp’s spyware attack however, was developed by the Israel’s NGO Group who developed the Pegasus. The Pegasus is a spyware which can activate the smartphone’s camera along with its microphone. This spyware had already been used to manipulate devices of the activists. Other than that, the spyware has been used by the Israeli government to spy on, manipulate, extract information from people on a global scale. Currently, WhatsApp hasn’t said anything about the number of users who have been affected by the issue. But the company is asking its users to update their application to the latest version. For the latest gadget and tech news, and gadget reviews, follow us on Twitter, Facebook and Instagram. For newest tech & gadget videos subscribe to our YouTube Channel. You can also stay up to date using the Gadget Bridge Android App.

How did the hackers install spyware in smartphones using WhatsApp s calling feature  - 36How did the hackers install spyware in smartphones using WhatsApp s calling feature  - 54