Service receive & sending SMS

Whatsapp used to spy users

1285   |     /   Security

Whatsapp used to spy users
Facebook fixed WhatsApp's zero day zero vulnerability, which could and was used to remotely install spyware on phones by calling the target device.

Using whatsapp without a phone is very simple, use the virtual numbers on the SIMonline website.

The bug, tracked as CVE-2019-3568, was described by Facebook as a buffer overflow in the WhatsApp VOIP stack. The security hole allows an attacker to remotely execute arbitrary code by sending specially crafted SRTCP packets to the target phone number.

Facebook fixed the vulnerability by releasing WhatsApp for Android 2.19.134, WhatsApp Business for Android 2.19.44, WhatsApp for iOS 2.19.51, WhatsApp Business for iOS 2.19.51, WhatsApp for Windows Phone 2.18.348 and WhatsApp for Tizen 2.18.15. On Friday, May 17, a server-side patch was implemented.

The FT reported that exploitation involves calling the target device via WhatsApp, but the victim does not need to be responsible for the vulnerability, and incoming calls are said to have disappeared from the logs.

WhatsApp did not name the object using CVE-2019-3568, but described it as an “advanced cyber subject” aimed at “a certain number of users.”

“Reportedly, this attack has all the hallmarks of a private company that works with governments to supply spyware that takes over the functions of mobile phone operating systems,” WhatsApp said.

Similar news

A remote code execution error was detected in Kaspersky products

Researchers have discovered a serious vulnerability in remote code execution affecting Kaspersky Lab products. The cybersecurity firm released a hotfix for customers in early April.

Drive Fenix - the new browser for Android

The Google Play Store has a new web browser from a familiar person. This is the Fenix ​​code name, and it will eventually turn into Firefox on Android phones and tablets.

Intel MDS Vulnerabilities: What You Need to Know

Tech giants have posted security recommendations and blog posts in response to Microarchitectural Data Sampling (MDS) vulnerabilities affecting most Intel processors released in the last decade.


This is not only a service for receiving and sending SMS messages to virtual numbers, but also a tutorial on user safety in the modern world, the latest developments in IT, social media security, fresh programs and lessons that simplify our lives. So are other issues encountered by the average user. In simple words, each user will find for themselves something interesting or answers to their questions.

SIMonline © 2018 - 2024

All rights reserved