HomeOther TechAppsHow did the hackers install spyware in smartphones using WhatsApp’s calling feature?

How did the hackers install spyware in smartphones using WhatsApp’s calling feature?

Learn how the hackers hacked WhatsApp and installed the spyware.

Earlier this week, it was reported that Facebook-owned instant messaging app – WhatsApp – was used by hackers to install spyware in users’ devices. The hackers had used a security flaw in the application’s calling feature to install spyware into the handsets without the user noticing. The Israeli spyware named ‘Pegasus’ was then used to gather information, details of their chats, calls and even mails. But were the hackers able to hack into one among the most popular and supposedly safe apps?

The hackers used or exploited the buffer overflow vulnerability inside the application. WhatsApp had said that it fixed the vulnerability quickly as soon as the attack was noticed. A buffer overflow issue occurs when an application is overloaded with data in its buffer/ temporary storage space. When the app overloads, it starts storing the extra amount of data to the adjacent storage which in turn corrupts the earlier data held there by overwriting it.

- Advertisement -

This causes the application to crash, corrupt or open a way for the hackers/ external parties to enter into the app/ system. In WhatsApp’s case, the hackers exploited the same buffer overflow flaw within the app’s call feature to install spyware into the smartphones without the knowledge of the user. The security flaw was in the calling feature of WhatsApp and it got activated once the user initiated or received a call even if he didn’t answer the call or it didn’t connect.

WhatsApp’s calling feature uses the Voice over Internet Protocol (VoIP) similar to many applications which uses the internet for calling instead of the standard telephone lines. According to Business Insider, when the user receives a telephone call on WhatsApp, the application sets up the VoIP transaction and the encryption which goes with it. The application then notifies the user about the incoming call and he then can choose to accept, decline or ignore the call.

The code used in WhatsApp’s spyware attack however, was developed by the Israel’s NGO Group who developed the Pegasus. The Pegasus is a spyware which can activate the smartphone’s camera along with its microphone. This spyware had already been used to manipulate devices of the activists. Other than that, the spyware has been used by the Israeli government to spy on, manipulate, extract information from people on a global scale.

Currently, WhatsApp hasn’t said anything about the number of users who have been affected by the issue. But the company is asking its users to update their application to the latest version.

For the latest gadget and tech news, and gadget reviews, follow us on TwitterFacebook and Instagram. For newest tech & gadget videos subscribe to our YouTube Channel. You can also stay up to date using the Gadget Bridge Android App.

- Advertisement -
Aman Singhhttps://www.gadgetbridge.com/
Aman Kumar Singh has a Masters in Journalism and Mass Communication. He is a journalist, a photographer, a writer, a gamer, a movie addict and has a love for reading (everything). It’s his love of reading that has brought him knowledge in various fields including technology and gadgets. Talking about which, he loves to tweak and play with gadgets, new and old. And when he finds time, if he finds time, he can be seen playing video games or taking a new gadget for a test run.


Please enter your comment!
Please enter your name here

- Advertisement -

Follow Us


Must Read

Samsung Galaxy S22 series pre-order begins, European pricing also leaked ahead of the launch

Samsung Galaxy S22 series pre-order begins, European pricing also leaked ahead...

The Samsung Galaxy S22 series is set to launch next month as the company prepares to showcase its flagship smartphones for 2022. Samsung has...
- Advertisement -