Wednesday, November 19, 2025

Meta Expands WhatsApp Safety Analysis with New Proxy Device and $4M in Bounties This Yr


Nov 18, 2025Ravie LakshmananBug Bounty / Knowledge Privateness

Meta on Tuesday stated it has made out there a device known as WhatsApp Analysis Proxy to a few of its long-time bug bounty researchers to assist enhance this system and extra successfully analysis the messaging platform’s community protocol.

The thought is to make it simpler to delve into WhatsApp-specific applied sciences as the appliance continues to be a profitable assault floor for state-sponsored actors and industrial adware distributors.

The corporate additionally famous that it is organising a pilot initiative the place it is inviting analysis groups to give attention to platform abuse with help for inner engineering and tooling. “Our aim is to decrease the barrier of entry for teachers and different researchers who won’t be as aware of bug bounties to hitch our program,” it added.

DFIR Retainer Services

The event comes because the social media large stated it has awarded greater than $25 million in bug bounties to over 1,400 researchers from 88 international locations within the final 15 years, out of which greater than $4 million had been paid out this yr alone for nearly 800 legitimate experiences. In all, Meta stated it obtained round 13,000 submissions.

A number of the notable bug discoveries included an incomplete validation bug in WhatsApp previous to v2.25.23.73, WhatsApp Enterprise for iOS v2.25.23.82, and WhatsApp for Mac v2.25.23.83 that would have enabled a person to set off processing of content material retrieved from an arbitrary URL on one other person’s gadget. There is no such thing as a proof that the problem was exploited within the wild.

Additionally patched by Meta is a vulnerability tracked as CVE-2025-59489 (CVSS rating: 8.4) that would have allowed malicious purposes put in on Quest units to govern Unity purposes to attain arbitrary code execution. Flatt Safety researcher RyotaK has been acknowledged for locating and reporting the flaw.

Easy WhatsApp Safety Flaw Exposes 3.5 Billion Cellphone Numbers

Lastly, Meta stated it added anti-scraping protections to WhatsApp following a report that detailed a novel technique to enumerate WhatsApp accounts at scale throughout 245 international locations and construct a dataset containing each person, bypassing the service’s rate-limiting restrictions. WhatsApp has about 3.5 billion energetic customers.

The assault takes benefit of a reliable WhatsApp contact discovery function that requires customers to first decide whether or not their contacts are registered on the platform. It basically permits an attacker to compile fundamental publicly accessible data, together with their profile pictures, About textual content, and timestamps related to key updates associated to the 2 attributes. Meta stated it discovered no indications that this vector was ever abused in a malicious context.

Apparently, the examine discovered hundreds of thousands of cellphone numbers registered to WhatsApp in international locations the place it is formally banned, together with 2.3 million in China and 1.6 million in Myanmar.

“Usually, a system should not reply to such a excessive variety of requests in such a short while – significantly when originating from a single supply,” Gabriel Gegenhuber, College of Vienna researcher and lead writer of the examine, stated. “This habits uncovered the underlying flaw, which allowed us to situation an successfully limitless requests to the server and, in doing so, map person knowledge worldwide.”

CIS Build Kits

Earlier this yr, Gegenhuber et al additionally demonstrated one other analysis titled Careless Whisper that confirmed how supply receipts can pose important privateness dangers to customers, thereby permitting an attacker to ship particularly crafted messages that may set off supply receipts with out their data or consent and extract their exercise standing.

“Through the use of this method at excessive frequency, we display how an attacker might extract non-public data, reminiscent of following a person throughout completely different companion units, inferring their day by day schedule, or deducing present actions,” the researchers famous.

“Furthermore, we will infer the variety of at the moment energetic person periods (i.e., foremost and companion units) and their working system, in addition to launch useful resource exhaustion assaults, reminiscent of draining a person’s battery or knowledge allowance, all with out producing any notification on the goal aspect.”

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com