Security

Patches

WhatsApp still working on making View Once chats actually disappear for all

So far it's more like View Forever


Updated Meta's efforts to stop people repeatedly viewing WhatsApp’s so-called View Once messages – photos, videos, and voice recordings that disappear from chats after a recipient sees them – so far remain incomplete.

An interim fix deployed to stop people keeping hold of View Once data has been defeated in less than a week by white-hat hackers. WhatsApp says it's still working on addressing the vulnerability in full and changes made so far are stop-gap measures.

View Once was introduced in August 2021 as an optional privacy measure. But last week security flaw finders at cryptowallet startup Zengo went public with ways to revive seemingly self-destructed View Once material.

Zengo used Meta's bug bounty program in August to report the security weakness to WhatsApp, and heard nothing back. After spotting multiple pieces of software that were designed to exploit this flaw and harvest supposedly self-destructing pictures, the crypto concern publicly disclosed the details.

Essentially, the API servers treat View Once messages as normal messages but with a flag on them saying: Please only show this once. A rogue app or browser extension able to talk to those servers could just ignore that request, allowing the user to keep the data.

As a result of the disclosure, WhatsApp tweaked its code a few days later to make it harder to get around the View Once requirements, and at first it appeared to have worked. Users of browser extensions that exploited the initial weakness to circumvent View Once complained their content-saving tools no longer worked.

Zengo re-investigated the issue and confirmed the update by Meta was incomplete, and said the root vulnerability allowing miscreants to keep View Once data was still there.

"While generally the fix was a good initial step in the right direction by Meta’s WhatsApp, it is still not enough," Zengo cofounder Tal Be'ery wrote in an explainer on Monday. "The core issue of the View Once media message containing all the information required to view it, in an environment that should not be able to show it, still remains unsolved."

As we said, the problem is that if you're able to make a client that imitates an official WhatsApp app, or able to manipulate the WhatsApp web app with an extension, the API service will trust your program to do the right thing when it receives a View Once message.

Though your humble vulture will refrain from going into too much detail about a not-fully-patched privacy hole at this stage, the video below shows this is not a terrifyingly complex shortcoming to exploit.

"We have shown it can be done," Be'ery told The Register. "So we assume others will be able to do that too."

Sure enough, one of the developers of a View Once exploit confirmed they have found a method to get around the updated WhatsApp code and will be publishing a new browser extension shortly.

The fundamental problem is that these supposedly evaporating messages are still being sent to platforms that shouldn't be getting them, Be'ery said. Until Meta changes that, the problem looks likely to persist. He said he was also disappointed that after all this Meta still hadn't got in touch with Zengo, despite its bug bounty terms of service promising frequent communication on submissions.

Meta declined to comment to The Register.

Sources familiar with the situation, however, told us the fix implemented to date was only meant to be an interim measure and a more comprehensive code revamp is under way. ®

Updated to add at 1815 UTC on September 18

Meta has assured us it's still working on addressing the privacy shortcomings reported by Zengo, and that's why the fix is so far incomplete. "As we said before, we are in the process of rolling out updates to View Once on web. Those additional updates are forthcoming," a spokesperson for WhatsApp told The Register.

Be'ery meanwhile said he was disappointingly awarded zero dollars by Meta's bug bounty program for pointing out a circumvention of WhatsApp's disappearing-messages feature that was being actively exploited in the wild.

That's because, according to Meta, the biz was already aware of the security failing and was trying to address it when he disclosed the issue to them.

Be'ery believes WhatsApp will try to fix this snafu by killing off View Once for its web client, thus stopping browser extension-based exploitation, though modified WhatsApp Android apps that ignore the View Once requirements, for example, will continue to be able to harvest supposedly self-destructing messages.

Send us news
16 Comments

WhatsApp may expose the OS you use to run it – which could expose you to crooks

Meta knows messaging service creates persistent user IDs that have different qualities on each device

Meta spruiks benefits of open sourcing Llama models – to its own bottom line

It's not like Zuck needs the coin despite increased infrastructure spend, headcount, losses on VR

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Just how private is Apple's Private Cloud Compute? You can test it to find out

Also updates bug bounty program with $1M payout

Five Eyes nations tell tech startups to take infosec seriously. Again

Only took 'em a year to dish up some scary travel advice, and a Secure Innovation … Placemat?

Brazen crims selling stolen credit cards on Meta's Threads

The platform 'continues to take action' against illegal posts, we're told

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw

Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy?

Private equity giant Thoma Bravo adds another trophy to its growing collection

The billionaire behind Trump's 'unhackable' phone is on a mission to fight Tesla's FSD

Dan O'Dowd tells El Reg about the OS secrets and ongoing clash with Musk

Millions of Android and iOS users at risk from hardcoded creds in popular apps

Azure Blob Storage, AWS, and Twilio keys all up for grabs

Beijing claims it's found 'underwater lighthouses' that its foes use for espionage

Release the Kraken!

Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Attacks on unprotected servers reach 'critical level'