Endpoint
1/13/2017
03:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

WhatsApp Denies It Has Backdoor For Decrypting Messages

'Backdoor' is really a feature for ensuring messages are not lost in certain situations, company claims.

WhatsApp’s much touted end-to-end encryption capability has become the subject of considerable scrutiny following a report by The Guardian Friday of a ‘backdoor’ in the messaging service that apparently allows for encrypted messages to be intercepted and read.

The Guardian’s report is based on a vulnerability disclosure that Tobias Boelter, a PhD student and computer scientist at the University of California made last April. 

Boelter claimed that he had found a serious weakness in the manner in which the latest version of WhatsApp handles messages that are sent to a recipient who might have swapped or reset their phone, or might simply have been offline when the message was sent.

In such situations Boleter said, WhatsApp holds the message and retransmits it when the recipient comes back online but using a different encryption key than the one that was originally used to encrypt the message.

This approach gives attackers an opportunity to spoof the recipient’s phone on the WhatsApps server, use their own public key, and intercept messages that were intended for the recipient.

The Guardian described Boelter’s discovery as a security backdoor that governments could use to snoop in on the communications of targeted and unsuspecting WhatsApp users.

WhatsApp’s practice of creating new encryption keys for offline users without the knowledge of the sender and then rebroadcasting the message, effectively allows Facebook to intercept and read the messages of users communicating with each other under the assumption that their messages are impenetrable, the paper warned.

In an updated blog post, Boelter Friday expressed uncertainty over whether the issue he discovered is a bug or a backdoor. “In other words: Is this flaw put deliberately into the WhatsApp messenger to allow them or the government to look at targeted messages?” he wrote. “Or is the flaw introduced through a simple programmer error? Or is it even a useful feature?”

According to Boelter, Facebook showed little interest when he first reported his discovery to them last April, but recently claimed that it was not a bug but a feature for ensuring messages got through as intended to offline users.

In an emailed statement to Dark Reading, a Facebook spokesperson described The Guardian’s claims as patently false. “The design decision referenced in the Guardian story prevents millions of messages from being lost,” the spokesperson said. “In many parts of the world, people frequently change devices and SIM cards. In these situations, we want to make sure people's messages are delivered, not lost in transit.”

In addition, WhatsApp has a security notifications option that people can use if they want to be notified when a contact’s security code or public encryption key has changed, the WhatsApp spokesman said.

Jon Geater, chief technology officer of Thales e-Security said the concerns raised by Boelter are not as serious as they might appear.

“Indeed, there is almost no hack here. One might argue that WhatsApp has elected to provide an insecure default configuration,” Geater said in a statement. “Users who care about the authorities intercepting their messages are quite likely to turn on security notifications, and then the problem is almost entirely diminished,” he said.

Dissidents and those using WhatsApp in repressive countries might need to take additional precautions like using an out of band method to ensure that a user has really changed devices, he said.

Chris Perry, COO of Secured Communications says the most troubling aspect about the whole controversy is the lack of full disclosure by Facebook WhatsApp.

“When a company builds into its system a failsafe, such as this feature, there should be full disclosure to their customer base that it exists and how and why it would be activated,” Perry says in comments to Dark Reading.

As it is, only the sender is informed of the encryption key change and that too only if the sender has opted-in to the notification warning, he says. “There should be a warning notification for both sender and recipient that is default activated advising when they are no longer in a secure encrypted environment.”

Related Content:

 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.