hometechnology NewsLessons to be learnt from the WhatsApp spyware attack

Lessons to be learnt from the WhatsApp spyware attack

By now, most have heard of WhatsApp’s recent spyware attack. The spyware was allegedly developed by the Israeli cyber intelligence company NSO Group, reported the Financial Times.

Profile image

By CNBC-TV18 May 15, 2019 2:33:28 PM IST (Published)

Listen to the Article(6 Minutes)
Lessons to be learnt from the WhatsApp spyware attack
By now, most have heard of WhatsApp’s recent spyware attack. The spyware was allegedly developed by the Israeli cyber intelligence company NSO Group, reported the Financial Times.

As per the FT report, a vulnerability in WhatsApp allowed attackers to inject spyware on phones by ringing up targets using the app's phone call function.
The attack once again reminded that mobile devices, the one thing most of us never leave home without, are vulnerable to spyware. And once again, private individuals were attacked.
The Facebook-owned platform is encouraging customers to update their apps as quickly as possible and to keep their mobile operating system up to date.
So what lessons can we learn from WhatsApp and other spyware attacks?
Check Point Software Technologies, a leading provider of cyber security solutions globally, did an in-depth research on the cause of this attack against the security patch from WhatsApp.
Such instances, such as the one faced by WhatsApp users, leave people exposed to a data breach, how vulnerable mobile devices are and the importance of taking proactive action to protect mobile devices, especially if they are used for business, according to Check Point.
"The WhatsApp hack illustrates that despite their best efforts, Apple and Google cannot completely secure the users of mobile devices running their operating systems", the research firm said in a report.
In order to ensure users are properly protected, Check Point suggests that a mobile threat defense solution must be in place that can prevent spyware from gathering intelligence on their targets.
The solution involves multiple steps:
  • Identifying advanced rooting and jailbreaking techniques
  • Detecting unknown malware
  • Preventing malicious outbound communications to command and control servers
  • According to Check Point, if spyware is simply detected after infecting the device it is too late. It is paramount to ensure that the attack is prevented before it actually infects the mobile device.
    If, however, the device becomes infected, it’s critical that no data be exfiltrated from of the device, the research firm said.

    Most Read

    Share Market Live

    View All
    Top GainersTop Losers
    CurrencyCommodities
    CurrencyPriceChange%Change