alt.hn

2/3/2026 at 2:38:26 PM

A WhatsApp bug lets malicious media files spread through group chats

https://www.malwarebytes.com/blog/news/2026/01/a-whatsapp-bug-lets-malicious-media-files-spread-through-group-chats

by iamnothere

2/3/2026 at 4:09:32 PM

Awful reporting. Vague workarounds for an issue "reported by Google Project Zero" without links to said report, but with links to Forbes (who interviewed one of WhatsApp's competitors about WhatsApp's security while their own app doesn't even do proper E2EE). Was there a human involved in publishing this page? If so, was leaving out the link to Project Zero intentional?

Anyway, according to Google Project Zero, the issue has been fixed with a comprehensive fix: https://project-zero.issues.chromium.org/issues/442425914

You can always enable lockdown mode and disable downloading media to protect against undetected vulnerabilities of course, but the bug has been fixed and you just need to update for the problem to go away.

by jeroenhd

2/3/2026 at 4:45:25 PM

Journalists (and their editors) are allergic to proper citations. This is just standard reporting stuff, not unusual in the least.

by mikkupikku

2/3/2026 at 5:08:52 PM

What is the actual implication of the attack. That your mobile data might be wasted?

by charcircuit

2/3/2026 at 5:26:04 PM

Sure, excess data use.

But media files that exploit parsers is the bigger issue. Errors in parsing have allowed for code execution, etc, in whatever context the parser runs; look into Stagefright and the many similar exploits before and after. Accepting media files from anywhere without user interaction is pretty risky. WhatsApp has a media file sanitizer, but it may not catch everything.

Disclosure: I worked at WhatsApp until 2019; but not on the media file sanitizer.

by toast0

2/3/2026 at 8:45:51 PM

But this exploit is about downloading the media. There doesn't seem to be a way to view it to trigger parsing it?

Edit: Rereading the big report it seems implied that it is not just talking about downloading the images, but also trying to show them.

by charcircuit

2/3/2026 at 9:36:40 PM

If the file is placed in your phone's media folder, it may be displayed when you use media features on your phone. It may also be processed automatically by other software; maybe to generate a thumbnail for use in the system media view or other reasons.

by toast0

2/3/2026 at 5:22:43 PM

The implication being that if the attacker could also craft a malicious payload that would cause a buffer overflow, they could chain the exploits to get remote code execution on the client.

While anyone can perform the attack described in the bug, it takes a very sophisticated attacker to craft the payload that can exploit Android’s media library.

by testdelacc1

2/3/2026 at 5:16:11 PM

Neat tool.

Prolificity (ooh, invented word?) could be more than quantity of words, maybe quality too?

by j45