Incident: WhatsApp Hack: Remote Surveillance Software Installed via VOIP Vulnerability

Published Date: 2019-05-14

Postmortem Analysis
Timeline 1. The software failure incident of the WhatsApp hack happened in early May, as mentioned in the article. 2. The article was published on 2019-05-14. 3. Therefore, the software failure incident of the WhatsApp hack occurred in early May 2019. [84816]
System 1. WhatsApp system 2. Vulnerability in the system VOIP of WhatsApp 3. Buffer overflow vulnerability 4. SRTCP protocol 5. Software with remote surveillance capabilities
Responsible Organization 1. Hackers were responsible for causing the software failure incident reported in Article 84816. [84816]
Impacted Organization 1. Users of WhatsApp [84816]
Software Causes 1. A vulnerability in the VOIP system of WhatsApp allowed remote code execution through specially crafted SRTCP packets, leading to the installation of surveillance software on targeted phones [84816].
Non-software Causes 1. Lack of end-to-end encryption in cloud backups, making them vulnerable to unauthorized access [84816] 2. Insufficient security measures in cloud services like Google Drive or iCloud for WhatsApp backups [84816]
Impacts 1. The software failure incident led to hackers being able to remotely install surveillance software on phones and other devices through a vulnerability in the WhatsApp messaging program [84816]. 2. The attack affected a small number of accounts, causing concerns about privacy and data security [84816]. 3. Users were advised to update their WhatsApp application to a new version that included fixes to protect against cyber attacks [84816]. 4. The incident highlighted the importance of taking additional security measures such as disabling cloud backups of WhatsApp chats, enabling two-factor authentication, and utilizing other security and privacy controls within the app [84816]. 5. The vulnerability exploited in the attack involved a 'buffer overflow' in the WhatsApp VOIP system, allowing remote code execution through specially crafted SRTCP packets sent to a targeted phone number [84816]. 6. The surveillance software installed by the hackers could intercept and read encrypted end-to-end messages on WhatsApp, compromising the privacy and security of user communications [84816].
Preventions 1. Updating the WhatsApp application to the latest version with security patches could have prevented the software failure incident [84816]. 2. Disabling cloud backups of WhatsApp conversations could have enhanced security and prevented unauthorized access to chat histories [84816]. 3. Enabling two-factor authentication in WhatsApp, also known as "verification in two steps," could have added an extra layer of security to prevent unauthorized access to accounts [84816]. 4. Utilizing additional security features within the WhatsApp application, such as controlling privacy settings, blocking contacts, and managing read receipts, could have helped prevent security breaches [84816].
Fixes 1. Updating the WhatsApp application to the latest version with security patches [84816] 2. Disabling cloud backups of WhatsApp chats to enhance privacy and security [84816] 3. Enabling two-factor authentication (verification in two steps) on WhatsApp for added security [84816] 4. Utilizing additional security controls and privacy settings within the WhatsApp application [84816]
References 1. WhatsApp company statement 2. Facebook (owner of WhatsApp) 3. Security experts 4. Committee to Protect Journalists 5. Newsbeat reporter

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown The software failure incident related to the WhatsApp hack described in Article 84816 is a case of a vulnerability being exploited by hackers to install surveillance software on users' devices. This incident is specific to the WhatsApp application and its security flaw that allowed for remote surveillance installation. There is no mention in the article of a similar incident happening before within the same organization (one_organization) or at other organizations (multiple_organization).
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase: The WhatsApp hack incident was a result of a vulnerability in the system's VOIP (Voice over Internet Protocol) feature that allowed hackers to remotely install surveillance software on targeted devices. This vulnerability was exploited through a specially crafted series of SRTCP (Secure Real-time Transport Protocol) packets sent to a targeted phone number [84816]. (b) The software failure incident related to the operation phase: The operation failure in this incident was due to the misuse of the WhatsApp system by hackers who exploited the vulnerability in the VOIP system to remotely install surveillance software on devices. This misuse led to unauthorized access and control over the app, compromising user privacy and security [84816].
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in Article 84816 was due to contributing factors that originated from within the system. The vulnerability in the WhatsApp system, specifically a 'buffer overflow' vulnerability in the VOIP system, allowed hackers to execute remote code and install surveillance software on targeted phones through specially crafted SRTCP packets sent to a phone number [84816].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The software failure incident in the WhatsApp hack was due to a vulnerability in the system VOIP of WhatsApp, which allowed hackers to execute remote code through specially crafted SRTCP packets sent to a target phone number. This vulnerability led to the installation of surveillance software on the target phone without human participation [84816]. (b) The software failure incident occurring due to human actions: The software failure incident in the WhatsApp hack was facilitated by human actions, specifically the actions of the hackers who exploited the vulnerability in the system VOIP of WhatsApp to remotely install surveillance software on targeted phones. Additionally, the article provides recommendations for users to take certain actions to protect their conversations, such as updating the app, disabling cloud backups, enabling two-factor authentication, and adding extra security layers [84816].
Dimension (Hardware/Software) hardware, software (a) The software failure incident occurring due to hardware: - The WhatsApp hack incident reported in Article 84816 was due to a vulnerability in the system VOIP of WhatsApp, which allowed hackers to execute remote code through a specially crafted series of SRTCP packets sent to a target phone number. This vulnerability in the VOIP system led to the installation of surveillance software on the phones, indicating a hardware-related failure [84816]. (b) The software failure incident occurring due to software: - The software failure incident in Article 84816 was primarily caused by a vulnerability in the software of WhatsApp. The hackers exploited a buffer overflow vulnerability in the VOIP system of WhatsApp to remotely install surveillance software on targeted devices. This software vulnerability allowed the execution of malicious code through manipulated SRTCP packets, highlighting a software-related failure [84816].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident related to the WhatsApp hack described in Article 84816 is malicious. Hackers exploited a vulnerability in the WhatsApp system to remotely install surveillance software on phones and other devices, indicating that the incident was caused by individuals with the intent to harm the system. The attackers used a vulnerability in the VOIP system of WhatsApp to execute remote code and install surveillance software on targeted phones. This malicious attack allowed the hackers to gain control of the app and potentially access encrypted messages, demonstrating a deliberate attempt to compromise user privacy and security [84816].
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident was not due to poor decisions but rather due to hackers exploiting a vulnerability in the WhatsApp software. The incident involved hackers using a vulnerability in the WhatsApp VOIP system to remotely install surveillance software on targeted phones. This was not a result of poor decisions made by the developers but rather a malicious exploitation of a security flaw in the software [84816].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence: The WhatsApp hack incident reported in Article 84816 was due to a vulnerability in the system VOIP of WhatsApp, which allowed hackers to execute remote code through specially crafted SRTCP packets sent to a target phone number. This vulnerability in the VOIP system led to the installation of surveillance software on the target phone, even if the call was not answered, indicating a flaw in the security of the VOIP system [84816]. (b) The software failure incident related to accidental factors: The incident of WhatsApp being hacked and surveillance software being remotely installed on phones was not accidental but rather a result of exploiting a vulnerability in the system VOIP of WhatsApp. The attack was deliberate and targeted, indicating a malicious intent rather than an accidental introduction of contributing factors [84816].
Duration temporary The software failure incident related to the WhatsApp hack described in Article 84816 can be categorized as a temporary failure. The incident occurred due to a vulnerability in the WhatsApp system that allowed hackers to remotely install surveillance software on targeted devices. The vulnerability was exploited through a specially crafted series of SRTCP packets sent to a targeted phone number. This temporary failure was not a permanent issue but rather a specific vulnerability that was exploited by the hackers [84816].
Behaviour crash, value, other (a) crash: The software failure incident in the WhatsApp hack incident can be categorized as a crash. The hackers exploited a vulnerability in the system's VOIP function to remotely install surveillance software on targeted devices. This led to the system losing control and allowing unauthorized access, resulting in a crash of the system's security measures [84816]. (b) omission: There is no specific mention of the software failure incident being caused by the system omitting to perform its intended functions at an instance(s) in the provided article. (c) timing: The software failure incident is not related to the system performing its intended functions correctly but too late or too early. (d) value: The software failure incident in the WhatsApp hack incident can be attributed to the system performing its intended functions incorrectly. The vulnerability in the VOIP system allowed for the execution of remote code, leading to the incorrect installation of surveillance software on targeted devices [84816]. (e) byzantine: The software failure incident does not exhibit characteristics of the system behaving erroneously with inconsistent responses and interactions. (f) other: The software failure incident in the WhatsApp hack incident can be further described as a security breach. The hackers exploited a vulnerability in the system to gain unauthorized access and install surveillance software on targeted devices, compromising user privacy and security [84816].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence, unknown (a) unknown (b) unknown (c) unknown (d) [84816] The software failure incident led to the installation of surveillance software on phones and other devices, impacting people's privacy and potentially exposing their conversations to unauthorized access. (e) unknown (f) unknown (g) unknown (h) unknown (i) unknown
Domain information [a] The failed system in the reported incident was related to the information industry, specifically the messaging and communication sector. The software failure incident involved the popular messaging application WhatsApp, which was hacked, leading to the installation of surveillance software on users' devices [84816].

Sources

Back to List