Oh, for F...acebook: WhatsApp, critics spar over alleged 'backdoor'

Don't panic, there's nothing to fear, insists green messenger

Updated WhatsApp’s end-to-end encryption can be potentially exploited by determined snoops to intercept and read encrypted messages, it was claimed today. Essentially, if an attacker can reroute a redelivered encrypted message, it is possible to decrypt the text.

Facebook-owned WhatsApp stresses this is not a serious flaw nor a deliberate backdoor in its code. Users can detect and stop the surveillance, if it happens, by activating security notifications in the application's settings.

At the heart of the matter is the exchange of cryptographic keys when two people start chatting to each other: their public keys are sent through Facebook's servers, and ideally the two people need to verify outside of WhatsApp that their keys haven't been tampered with during the handover.

If it's not possible to verify the keys, or there isn't an opportunity to verify the keys, you're potentially open to man-in-the-middle surveillance. For example, a snooper could stop a WhatsApp message from being sent, take over the recipient's phone number, trigger a public key exchange between the sender and the snooper's handset that's now using the recipient's hijacked number, receive the redelivered text before the sender has a chance to verify the new public key, and decrypt the message they're not supposed to read. This is non-trivial to exploit and rather easy to detect when it happens, rendering it pointless.

The problem – which is "endemic to public key cryptography" – was raised in April last year, and at the time WhatsApp said it wasn't a serious enough design flaw to spend time fixing.

Now allegations that WhatsApp deliberate knackered its security have flared up again, this time reported in The Guardian. In response, the Facebook-owned messaging service said it designed its app to redeliver messages as described above to allow texts to be sent in parts of the world where people frequently swap devices and SIM cards.

Today WhatsApp reminded us it is possible to configure the software to notify you when a key is changed if you're worried about state-level surveillance:

Over 1 billion people use WhatsApp today because it is simple, fast, reliable, and secure. At WhatsApp, we’ve always believed that people’s conversations should be secure and private. Last year, we gave all our users a better level of security by making every message, photo, video, file and call end-to-end encrypted by default. As we introduce features like end-to-end encryption, we focus on keeping the product simple and take into consideration how it's used every day around the world.

In WhatsApp's implementation of the Signal Protocol, we have a “Show Security Notifications” setting (option under Settings > Account > Security) that notifies you when a contact's security code has changed. We know the most common reasons this happens are because someone has switched phones or reinstalled WhatsApp. This is because in many parts of the world, people frequently change devices and SIM cards. In these situations, we want to make sure people's messages are delivered, not lost in transit.

The alleged weakness in WhatsApp’s encryption system was documented by Tobias Boelter, a cryptography and security researcher at the University of California, and branded a "backdoor" today in The Grauniad. The paper fears governments can abuse the messenger app's design, which is based on Open Whisper's Signal protocol, to snoop on people's conversations.

Some infosec bods are critical of Facebook’s design decisions in rolling out its end-to-end encryption in WhatsApp.

Neil Cook, chief security architect at Open-Xchange, commented: “WhatsApp has already broken their promise not to share user data with Facebook, and now it seems that their promise of end-to-end encrypted messaging isn’t quite as secure as everyone had hoped, particularly given the involvement of Open Whisper Systems. It’s worth noting that this error in the encryption protocol is not present in Signal, so the team at WhatsApp have made the change intentionally.”

Matthew Aldridge, solutions architect at Webroot, added: “This flaw allows Facebook/WhatsApp to intercept messages if they choose to, by having the sender’s software automatically flip across to a second encryption key. The functionality is designed to create a seamless user experience for users who have connectivity issues or drop offline for a time during a conversation, but it has resulted in a situation where it could be used to intercept messages by WhatsApp. For those sending highly sensitive messages, or simply looking to avoid this, you should switch on the key change warnings in settings, and always check that the two ticks appear after sending messages in an active conversation.”

Others fault Facebook for failing to respond quickly enough.

Jacob Ginsberg, senior director at Echoworx, an expert in end-to-end messaging encryption, said: “The fact that Facebook has known about this vulnerability since April is doubly damming. Not only could this be seen by many as supporting on-going government data collection interventions, it means their talk of encryption and privacy has been nothing more than lip service. The company needs to actively address its security measures.” ®

Updated to add

In a follow-up statement, WhatsApp denied accusations that it had inserted what amounted to a backdoor in its messaging code:

The Guardian posted a story this morning claiming that an intentional design decision in WhatsApp that prevents people from losing millions of messages is a “backdoor” allowing governments to force WhatsApp to decrypt message streams. This claim is false.

WhatsApp does not give governments a “backdoor” into its systems and would fight any government request to create a backdoor. The design decision referenced in the Guardian story prevents millions of messages from being lost, and WhatsApp offers people security notifications to alert them to potential security risks. WhatsApp published a technical white paper on its encryption design, and has been transparent about the government requests it receives, publishing data about those requests in the Facebook Government Requests Report.

Meanwhile, cryptographers aren't so sure this is such a serious issue – rather, it's an issue with all public-private-key encryption systems:

Broader topics

Other stories you might like

  • Telegram adds paid tier as it cracks 700 million users
    Without so much as a mention of encryption, but with a pastel-hued emoji-heavy nod to ‘sustainable monetization’

    Messaging app Telegram, which came to prominence for offering end-to-end encryption that irritated governments, has celebrated passing 700 million active monthly users with a pastel-hued announcement: a paid Premium tier of service.

    A Sunday post celebrates the 700 million user milestone by announcing a $4.99/month tier. The Premium tier distinguishes itself from the freebie plebeian tier with the ability to upload 4GB files, unthrottled downloads that come as fast as users' carriers will allow, and the chance to follow up to 1000 channels, create up to 20 chat folders each containing up to 200 chats, and to run four accounts in the Telegram app.

    Paying punters will also get exclusive stickers and reactions and won't see ads once they sign up to hand over coin each month.

    Continue reading
  • Crypto sleuths pin $100 million Harmony theft on Lazarus Group
    Elliptic points to several indicators that suggest the North Korea-linked gang was behind the hack

    Investigators at a blockchain analysis outfit have linked the theft of $100 million in crypto assets last week to the notorious North Korean-based cybercrime group Lazarus. The company said it had tracked the movement of some of the stolen cryptocurrency to a so-called mixer used to launder such ill-gotten funds.

    Blockchain startup Harmony announced June 23 that its Horizon Bridge – a cross-chain bridge service used to transfer assets between Harmony's blockchain and other blockchains – had been attacked and crypto assets like Ethereum, Wrapped Bitcoin, Binance Coin, and Tether stolen.

    According to blockchain analytics company Elliptic, the attacker immediately turned to Uniswap, a decentralized exchange, to convert most of the assets into 85,837 Ethereum, which researchers said is a common method used by hackers to avoid the stolen assets from being seized.

    Continue reading
  • Protecting data now as the quantum era approaches
    Startup QuSecure is the latest vendor to jump into the field with its as-a-service offering

    Analysis Startup QuSecure will this week introduce a service aimed at addressing how to safeguard cybersecurity once quantum computing renders current public key encryption technologies vulnerable.

    It's unclear when quantum computers will easily crack classical crypto – estimates range from three to five years to never – but conventional wisdom is that now's the time to start preparing to ensure data remains encrypted.

    A growing list of established vendors like IBM and Google and smaller startups – Quantum Xchange and Quantinuum, among others – have worked on this for several years. QuSecure, which is launching this week after three years in stealth mode, will offer a fully managed service approach with QuProtect, which is designed to not only secure data now against conventional threats but also against future attacks from nation-states and bad actors leveraging quantum systems.

    Continue reading
  • Cheers ransomware hits VMware ESXi systems
    Now we can say extortionware has jumped the shark

    Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months.

    ESXi, a bare-metal hypervisor used by a broad range of organizations throughout the world, has become the target of such ransomware families as LockBit, Hive, and RansomEXX. The ubiquitous use of the technology, and the size of some companies that use it has made it an efficient way for crooks to infect large numbers of virtualized systems and connected devices and equipment, according to researchers with Trend Micro.

    "ESXi is widely used in enterprise settings for server virtualization," Trend Micro noted in a write-up this week. "It is therefore a popular target for ransomware attacks … Compromising ESXi servers has been a scheme used by some notorious cybercriminal groups because it is a means to swiftly spread the ransomware to many devices."

    Continue reading
  • Europe proposes tackling child abuse by killing privacy, strong encryption
    If we're gonna go through this again, can we just literally go back in time?

    Proposed European regulations that purport to curb child abuse by imposing mass surveillance would be a "disaster" for digital privacy and strong encryption, say cybersecurity experts.

    A number of options have been put forward for lawmakers to mull that aim to encourage or ensure online service providers and messaging apps tackle the "detection, removal, and reporting of previously-known and new child sexual abuse material and grooming."

    These options range from voluntary detection and reporting of child sexual abuse material (CSAM) and grooming, to legally mandating that service providers find and report such material using whatever detection technology they wish — essentially scanning all private communications and, if necessary, breaking end-to-end (E2E) encryption for everyone.

    Continue reading
  • How ICE became a $2.8b domestic surveillance agency
    Your US tax dollars at work

    The US Immigration and Customs Enforcement (ICE) agency has spent about $2.8 billion over the past 14 years on a massive surveillance "dragnet" that uses big data and facial-recognition technology to secretly spy on most Americans, according to a report from Georgetown Law's Center on Privacy and Technology.

    The research took two years and included "hundreds" of Freedom of Information Act requests, along with reviews of ICE's contracting and procurement records. It details how ICE surveillance spending jumped from about $71 million annually in 2008 to about $388 million per year as of 2021. The network it has purchased with this $2.8 billion means that "ICE now operates as a domestic surveillance agency" and its methods cross "legal and ethical lines," the report concludes.

    ICE did not respond to The Register's request for comment.

    Continue reading

Biting the hand that feeds IT © 1998–2022