{"id":3674,"date":"2012-09-11T04:00:14","date_gmt":"2012-09-11T04:00:14","guid":{"rendered":"https:\/\/wordpress-256057-797351.cloudwaysapps.com\/?p=3674"},"modified":"2019-01-12T22:48:18","modified_gmt":"2019-01-12T17:18:18","slug":"another-whatsapp-vulnerability-leaked-imei-number-as-password","status":"publish","type":"post","link":"https:\/\/dailyjag.com\/technology\/another-whatsapp-vulnerability-leaked-imei-number-as-password\/","title":{"rendered":"Hacker finds another WhatsApp Vulnerability"},"content":{"rendered":"

It seems that WhatsApp is full of vulnerabilities. Last year in May, it was revealed to the world that WhatsApp accounts could be hijacked without the user knowing it. This year in January, we came to know that the status of a WhatsApp user could be changed remotely. It was found in May 2011 that WhatsApp sends communication in plaintext and was fixed a year later in May this year.\u00a0It hasn’t been a long time since these vulnerabilities were fixed.\u00a0Now there’s a new vulnerability to make both WhatsApp and its users to worry about.<\/p>\n

According to the\u00a0Wikipedia page for WhatsApp<\/a>,<\/p>\n

WhatsApp uses a customized version of the open standard\u00a0Extensible Messaging and Presence Protocol (XMPP).Upon installation, it creates a user account using one\u2019s phone number as username (Jabber ID:\u00a0[phone number]@s.whatsapp.net<\/code>) and an\u00a0MD5-hashed, reversed-version of the phone\u2019s\u00a0IMEI\u00a0as password.<\/p><\/blockquote>\n

And really, WhatsApp uses exactly the same procedure mentioned above without any variation. Neither there is any salting of the hash nor obfuscated MD5 variant. For example, on Android platform you can find any WhatsApp password using IMEI number with a single line of code given below:<\/p>\n

md5(strrev(\u2018your-imei-goes-here\u2019))<\/p>\n

Finding the username is even more simpler. Your phone number is your username!<\/p>\n

There are multiple ways through which one can find someone’s IMEI number:<\/p>\n

    \n
  1. Through direct access to the victims phone. Jost dial & call *#06# (in most cases) and you’ll get the IMEI number.<\/li>\n
  2. An app that silently sends the victims IMEI number to a server in the background (many applications do this already) & phone number, either by letting users fill it in themselves in a registration part of the app, or also silently (this method however isn\u2019t always airtight but works in a lot of cases).<\/li>\n
  3. A hacker leaks a database\/file with IMEI numbers with associated phone numbers.<\/li>\n
  4. A spammer buys this information from an app developer.<\/li>\n<\/ol>\n

    SAMPLE ANDROID CODE:<\/h4>\n

    To retrieve IMEI number:<\/strong>
    \n<\/code><\/p>\n

    TelephonyManager tm = (TelephonyManager) getSystemService(Context.TELEPHONY_SERVICE);<\/code><\/p>\n

    String device_id = tm.getDeviceId();<\/code><\/p>\n

    To retrieve \u00a0phone number:<\/strong>
    \n<\/code><\/p>\n

    TelephonyManager tMgr =(TelephonyManager)mAppContext.getSystemService(Context.TELEPHONY_SERVICE);
    \n<\/code><\/p>\n

    mPhoneNumber = tMgr.getLine1Number();<\/code><\/p>\n

    To retrieve voicemail number (just for fun):<\/strong>
    \n<\/code><\/p>\n

    TelephonyManager.getCompleteVoiceMailNumber();<\/code><\/p>\n

    By implementing this code you can tap anybody’s WhatsApp messages. You can hack anybody’s WhatsApp account with just their IMEI numbers.<\/p>\n

    This vulnerability can leak user’s sensitive data and messages. Or it is possible that it may already have been happening with users or maybe with you!<\/p>\n

    So next time think twice before sending any sensitive information or receiving any message over WhatsApp because you never know where is it going or from where is it coming. It may be possible that there may be \u00a0a hacker on the other end. WhatsApp is far from secure right now.<\/p>\n

    Source: SamGranger.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

    It seems that WhatsApp is full of vulnerabilities. Last year in May, it was revealed to the world that WhatsApp accounts could be hijacked without the user knowing it. This year in January, we came to know that the status of a WhatsApp user could be changed remotely. It was<\/p>\n","protected":false},"author":36,"featured_media":3679,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[6,16],"tags":[55,16782,519,284,399,198,1714,1713,663,614,1716,1719,1380,1379,1718,222,1717,713,508,1712,1711,1715],"_links":{"self":[{"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/posts\/3674"}],"collection":[{"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/comments?post=3674"}],"version-history":[{"count":0,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/posts\/3674\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/media\/3679"}],"wp:attachment":[{"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/media?parent=3674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/categories?post=3674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dailyjag.com\/wp-json\/wp\/v2\/tags?post=3674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}