hackers enables to exploit a loophole in the communication system to penetrate the application
Whatsapp August and Talagram, although the latter two are among the more secure instant messaging applications thanks to encryption techniques.
And promote the application Whatsapp August and Talagram to themselves as the safe alternative to phone calls, and text messages, e-mails, but that does not preclude the other have been compromised if exploited loopholes from the outside of them.
And it enables hackers after exploiting a vulnerability in so-called “reference system No. 7” Signaling System No 7, which is a global network of communications companies operating as the pool Central connects companies around the world.
The multicast applications encrypted normally prevent external hackers access to user messages thanks to encryption technology “end to end” that stores the key to cancel encrypt messages on the two ends of the conversation only, that is, that enables one to access the messages will not be able to read messages or cancel encrypted.
But because of the gap in signal No. 7 system SS7 enables hackers to penetrate the application Whatsapp August and Talagram, through delude communications network that the phone attacker has the same number of the victim, which means the possibility of creating an account on the two applications and receive secret code, which proves that the phone is the same owner account.
After the completion of the process, it becomes the attacker can control the victim’s account, including the ability to send and receive messages, as well as read.
But because of the gap in signal No. 7 system SS7 enables hackers to penetrate the application Whatsapp August and Talagram, through delude communications network that the phone attacker has the same number of the victim, which means the possibility of creating an account on the two applications and receive secret code, which proves that the phone is the same owner account.
After the completion of the process, it becomes the attacker can control the victim’s account, including the ability to send and receive messages, as well as read.
As for the reason for leaving loopholes SS7 system without reform, the system goes back to the network of communications companies around the world, which means that none of those companies owns or controls the system, so any changes it requires complicated procedures.
It also said that the intelligence agencies stand between the gaps and the capabilities of telecommunications companies to repair, they use it to spy on the users in the case of adoption applications to complex encryption techniques.

إرسال تعليق