Hindustan Times (Delhi)

Two malware alerts were issued in May

- Sudhi Ranjan Sen

A SECOND ALERT ISSUED ON MAY 25 URGED STAFF IN ALL GOVT DEPARTMENT­S AND SECURITY FORCES TO TAKE CORRECTIVE ACTION

NEW DELHI: As the controvers­y over the alleged use of malware on messaging service Whatsapp deepens, it has emerged that a general alert was sent out by the Computer Emergency Response Team on May 17, 2019, and warned of the social media platform being compromise­d by the Pegasus spyware made by Israelbase­d NSO Group. The CERT alert was issued for people-atlarge.

In addition to this, a more detailed alert was issued by the Threat Analytical Unit (TAU) of the Indian Cyber Crime Coordinati­on Division on May 25, 2019, urging staff in all government department­s and security forces to take corrective action. “A zeroday vulnerabil­ity has been identified in Whatsapp VOIP stacks which allows attackers to install spyware named Pegasus to steal personal informatio­n from text messages to call logs and location data.” VOIP is short for Voice Over Internet Protocol. It advised people to immediatel­y update their Whatsapp versions.

TAU is part of the recently formed Cyber and Informatio­n Security Division and plays a crucial role in providing a platform for law enforcemen­t personnel, people from private sector, academia and research organizati­ons to collaborat­ively analyse all pieces of the puzzles in cybercrime­s.

TAU produces cybercrime threat intelligen­ce reports and issues alerts on emerging cybercrime threats. It functions in close coordinati­on with the Indian security infrastruc­ture. TAU also works in close coordinati­on with the CERT and is used to raise awareness and initiate defensive cyber operations.

The May 25 alert said: “Whatsapp uses the secure, real-time transport protocol to establish connection­s between clients and allow for audio and a video call. A buffer overflow vulnerabil­ity in the Whatsapp VOIP stack allows remote attackers to execute arbitrary code on the target phones by sending a specially crafted series of Secure Real-time Transport Protocol (SRTCP) packets by merely placing a Whatsapp call, even when the call is not answered.” In addition, the alert also listed the kind of operating software of phones that are particular­ly vulnerable to Pegasus.

Similarly, the Computer Emergency Response System of India in the May 17 alert had described the “buffer overflow condition error”, the coding flaw in Whatsapp that was exploited to deliver the malware to targets. Like the later alert of TAU, the CERT alert also advised using patches and updating the version of Whatsapp software.

It is not clear whether CERT.IN and TAU had individual­ly detected the Pegasus malware or were only reacting to global reports of the Whatsapp messaging service being comprised. “It was a combinatio­n of both. Reports of Whatsapp being compromise­d were taken note of,which were investigat­ed separately before the alert was issued,” a senior official who did not want to be named said.

“Every software has its own vulnerabil­ities...hackers exploit these vulnerabil­ities. The exploitati­on of such weakness in Whatsapp is one such case,” former Cyber Security Coordinato­r Gulshan Rai said.

Newspapers in English

Newspapers from India