A vulnerability in the WhatsApp messaging application has allowed attackers to install on users ‘ mobile devices a ‘ spyware ‘ only with receiving a voice call, and users are encouraged to update the ‘ Software ‘ After spreading a patch that fixes the error.
The security problem of WhatsApp, discovered in this month of May and has been active for weeks, is present in the version of WhatsApp for both Android and iOS, as reported by the daily Financial Times.
The Israeli group NSO Group, responsible for the ‘ software ‘ of Pegasus spying, is the author of the development of the malicious code of surveillance, or ‘ spyware ‘, which exploits a vulnerability in the voice call function of WhatsApp.
The ‘ malware ‘ of NSO Group manages to be transmitted to the device of a user of WhatSApp when it receives a voice call by the application, even in the cases in which the user does not answer it. Malicious calls often disappeared from the call log.
The vulnerability of WhatsApp has been discovered this Sunday when a British lawyer specializing in human rights was attacked through his phone using the tool NSO Group.
The cybersecurity group of the University of Toronto (Canada), Citizen Lab, has linked the attack last Sunday with a vulnerability for which WhatsApp has distributed a security patch that solves it, which came to the servers on Friday and Users this Monday, as WhatsApp has secured to Financial Times.
“We have informed a number of human rights organizations to share the information we can, and to work with them to notify civil society,” said a spokesperson for the company in a statement to the media quoted.