Bas Bosschert has described a process by which the chat database can be read even if it's encrypted. His proof-of-concept, here, runs through the process.
If an attacker was to “combine it with something like FlappyBird and a description how to install applications from unknown sources,” he writes, “you can harvest a lot of databases”.
Bas Bosschert has worked out how to read WhatsApp stored chats
For unencrypted stores, the work's already done. For newer
versions of WhatsApp, he writes, decryption is already available from
the WhatsApp Xtract backup tool.For Bosschert's attack to work, all that's required is that the user grants sufficient permissions to the malicious app. As he writes: “ since [the] majority of the people allows everything on their Android device, this is not much of a problem.
No comments:
Post a Comment