WhatsApp exploit lets hackers manipulate group chat messages
Researchers say the flaw could be used to spread fake news across the platform


Researchers have uncovered a vulnerability in WhatsApp's encryption method that can allow malicious actors to manipulate messages and user identities in group chats, with the fear that this could be used to spread fake messages and news.
All messages sent through the service are secured via end-to-end encryption meaning not even WhatsApp is able to see them. But a team from Check Point Research discovered three methods of attack that can be derived from reversing this encryption process, and then accessing the decrypted communications data.
Using the 'quote' feature in a group chat, hackers can change the identity of a sender, alter the text of a previously sent message, and send a private message to a group member disguised as a public message meaning their response (to what they believe is a private message) will be made public.
WhatsApp has denied this is a vulnerability, and insists end-to-end encryption remains safe.
"WhatsApp, has over 1.5 billion users with over one billion groups and 65 billion messages sent every day. With so much chatter, the potential for online scams, rumours and fake news is huge," Check Point Research's Dikla Barda, Roman Zaikin and Oded Vananu wrote in a blog post.
"It doesn't help then, if threat actors have an additional weapon in their arsenal to leverage the platform for their malicious intentions."
"Following the process of Responsible Disclosure, Check Point Research informed WhatsApp of their findings. From Check Point Research's view, we believe these vulnerabilities to be of the utmost importance and require attention."
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
After decrypting WhatsApp messages and accessing them via the web, the researchers were able not only to see the individual parameters that make up the messages i.e. the sender name, message content, recipient name, etc but manipulate these fields.
In one example, researchers were able to change a message posted in a group chat from a link to an article recommending "great health tips", to a message that read "guys I just heard product X can cause illness in children. I will not be buying it anymore!!" using the quote feature.
The researchers also developed a version of the tool they used to demonstrate the exploits that users can download for free via Github.
WhatsApp's use of end-to-end encryption, fully employed since 2016, has drawn the ire of national governments and security agencies, who argue the messaging app can be used by extremists to plot terrorist attacks without being traced.
Crucially, because the nature of this form of encryption means WhatsApp doesn't store any of the data sent using the app, it's difficult to see how messaging service to verify or cross-reference suspected fake messages with 'originals' if they are manipulated using methods such as those deployed by Check Point Research.
"We carefully reviewed this issue and it's the equivalent of altering an email to make it look like something a person never wrote," a WhatsApp spokesperson said.
"This claim has nothing to do with the security of end-to-end encryption, which ensures only the sender and recipient can read messages sent on WhatsApp.
"We take the challenge of misinformation seriously and recently placed a limit on forwarding content, added a label to forwarded messages, and made a series of changes to group chats.
"We ban accounts that attempt to modify WhatsApp to engage in spammy behavior and we are working with civil society in several countries to educate people about fake news and hoaxes."
The spokesperson added that to make the changes Check Point Research suggested, WhatsApp would be required to log all messages - which it was not prepared to do for the sake of user privacy - or severely limit the functionality of group chats.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Google pays largest-ever bug bounty worth £500,000
News The company remained tight-lipped over the exploit itself, but speculation is possible given its publicly available rewards breakdown
By Connor Jones Published
-
OpenSSL 3.0 vulnerability: Patch released for security scare
News The severity has been downgraded from 'critical' to 'high' and comparisons to Heartbleed have been quashed
By Connor Jones Published
-
Hacker steals $566 million from Binance Bridge using proof-forgery exploit
News An exploit discovered in the exchange platform's proof verifier let the hacker take 2m BNB without raising alarm bells
By Rory Bathgate Published
-
CISA issues fresh orders to polish security vulnerability detection in federal agencies
News The move marks the latest step in the cyber security authority's ongoing ambition to minimise the government's exposure to attacks
By Praharsha Anand Published
-
Mozilla patches high-severity security flaws in new ‘speedy’ Firefox release
News Numerous vulnerabilities across Mozilla's products could potentially lead to code execution and system takeover
By Connor Jones Published
-
WordPress plugin vulnerability leaves sites open to total takeover
News Customers on WordFence's paid tiers will get protection from the WPGate exploit right away, but those on the free-tier face a 30-day delay
By Rory Bathgate Published
-
Numerous HP business laptops and desktops vulnerable to publicly disclosed security bugs
News Researchers revealed the details of the six vulnerabilities at Black Hat in August but many laptops, desktops, and workstations remain vulnerable
By Connor Jones Published
-
HP patches high-severity security flaw in its own support tool
News The application that's installed in every HP desktop and notebook was allowing hackers to elevate privileges through a DLL hijacking vulnerability
By Connor Jones Published