The well-known instant messaging application, of course, WhatsApp is undoubtedly one of the best and most used private messaging apps out there. With constant news, has managed to remain at the top of the choice of users. But, now according to the latest reports, this new WhatsApp spyware lets anyone leak your private chats.
WhatsApp Users Beware! This Spyware Could Leak Your Private Chats
With more than 1.5 billion active users and 60 billion messages sent daily, the well-known instant messaging application, of course, WhatsApp dominates and is one of the most used instant messaging services.
Hence, the well-known instant messaging application, of course, WhatsApp is undoubtedly one of the best and most used private messaging apps out there. With constant news, has managed to remain at the top of the choice of users.
Though everything seems to be positive for this service, of course, the well-known instant messaging application WhatsApp but the truth is that it has gone through serious problems. But, as we told like any other service it also has flaws and problems, always resolved quickly.
Also read: How To Crash Someone’s Whatsapp By Sending Lots Of Smileys
The well-known Bochum security provider, of course, I am talking about the G Data which has recently analyzed a new spyware for the tech giant Google’s Android mobile operating system. And not only that even this spyware is also capable to spy on private WhatsApp conversations and calls. The malware code is even publicly available in a repository called “OwnMe” on GitHub.
The malware consists of a MainActivity.class, which in turn starts the OwnMe.class service. Then it simply displays a pop-up message with the text “Service started”. The well-known security provider, of course, G Data suspects that the spyware is still under development or just badly programmed. However, apart from all these things, this critical spyware also has some extraordinary features.
An internet connection is created by the webpage called Busham.A (PDF) via HTTPs or HTTPS. Because the websocket connections do not require headers, simply due to less data is consumed, so the spyware should not expose itself to the victim with high data usage.
In addition, according to the analysis Busham.A is able to load various modules, for example, to read the entire WhatsApp database and transmit it to a server on the Internet. In addition, the malware can also retrieve contents of the browser history or the bookmarks and transfer the contacts to a server of the attacker.
However, a function to read the call log also work, but, it needs a permission that would have to be given to the malicious app in advance. Without authorization, G Data’s analysis appears to have a feature that gives attackers access to a smartphone’s camera.
Spyware was first discovered in early September by ESET researcher Lukas Stefanko. He found that after the gallery, text messages and the battery status of a smartphone. So, what do you think about this? Simply share all your views and thoughts in the comment section below.