Here’s how it works and how to avoid it

NinFan

Here’s how it works and how to avoid it

avoid, Heres, works

Being the most popular instant messaging app, WhatsApp offers different clients for each operating system. WhatsApp for Windowsalso called WhatsApp Desktop, offers a good experience despite its similarities to WhatsApp Web, accessible from any browser.

However, like any other software, it is susceptible to bugs that can cause problems for users. This is the case with bug which is found in Pplware, which represents a great threat compared to the receiving files. We explain what it is and how to avoid it.

WhatsApp and Python, a dangerous combination

Despite Meta’s efforts to protect its messaging application, various vulnerabilities sometimes appear that hackers exploit to attacking users of the platform. Fortunately, to avoid invasions of our account, we have a setting that is important to review from time to time and to protect our discussions, there are two security tips.

WhatsApp Web or WhatsApp Desktop: Which is better and when is it advisable to choose one or the other version?

However, each WhatsApp client is a world, and in this sense, the Windows PC version hides a serious security breach What Meta has not covered at the moment. When a contact sends us a file, a photo or an audio via WhatsApp, the service blocks those potentially dangerous, to guarantee our safety.

Of course, there are exceptions, and very dangerous ones, it must be said. In the WhatsApp client for Windows, they can send you a attachment in Python and PHP which will be executed without notice. Of course, in such a case, if the attacker wants to succeed, the user must have Python installed.

Registration 2024 07 29 113334

This greatly limits the target users, because It is aimed primarily at software developers and advanced users.. This fact does not diminish its importance in any way: there are three types of files that the WhatsApp client for Windows does not block.

  • .PYZ format: Python application in a ZIP file
  • .PYZW format: PyInstaller program
  • .EVTX format: Microsoft event log

These were spotted by security researcher Saumyajeet Das while he was experimenting with the types of files that could be attached in Meta app chats. As we read in the middle, further testing confirmed this issue and also added another equally serious one: WhatsApp “swallows” the PHP script executions.

All it takes is receiving one of these files and pressing the “Open” button for our security to be compromised. The aforementioned researcher reported this bug to Meta on June 3. More than a month later, the company responded that the issue had been reported and should now be resolved.

This did not happen, as it is still present in the current public version of WhatsApp for Windows. So we can only continue to wait and protect ourselves from this threat. How? Mainly, not allowing users who are not contacts to send us files, and if we ever find a file of this type, the best thing would be to ignore it.

By | Software

Cover Image | Microsoft Designer with Photoshop AI

In Xataka Android | How to update WhatsApp for Android to the latest version

Leave a Comment