The security research team in the Dark Nevi Org Group announced the discovery of a loophole in the “WhatsApp” application, which allows the implementation of a breakthrough without any interaction from the user, as soon as the image – even without opening it – was received – according to a report published by the “Cyber ​​Security News” website.

The researchers conducted an offer to prove a concept to ensure the mechanism of work of the vulnerability, and it became clear to them that they are using two gaps that work together on “Apple” devices of all kinds: “MacBook”, “iPad” and “iPhone”. The exploitation begins with a logical error in how WhatsApp deal with the simultaneous messages between the devices, as the application is not achieved whether the message is sent from a reliable device linked to the original phone number, allowing the attacker to pass a message that appears to be from a reliable source and bypassing safety tests.

After the malicious message arrives, the second gap begins to work and enables the attacker to penetrate the device without having to click on the image or download it. According to the team’s report, the striker can fully control the phone, including access to files and monitor the use of the device and the messages issued by it.

It should be noted that the “WhatsApp” application had previously faced similar “Zero Click” attacks, some of which were linked to media reports on companies specialized in monitoring technologies. In the same context, security platforms such as Cyber ​​Security News called on users to update operating systems and WhatsApp regularly to ensure the latest available security corrections.

The post Researchers reveal a new way to penetrate the iPhone via WhatsApp appeared first on 961 tobay Lebanon today.