Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Digital Espionage. Show all posts

Critical WhatsApp Zero Click Vulnerability Abused with DNG Payload

 


It has been reported that attackers are actively exploiting a recently discovered vulnerability in WhatsApp's iOS application as a part of a sophisticated cyber campaign that underscores how zero-day vulnerabilities are becoming weaponised in today's cyber warfare. With the zero-click exploit identified as CVE-2025-55177 with a CVSS score of 5.4, malicious actors can execute unauthorised content processing based on any URL on a victim's device without the need for user interaction whatsoever. 

A vulnerability referred to as CVE-2025-55177 provides threat actors with a way to manipulate WhatsApp's synchronization process, so they may force WhatsApp to process attacker-controlled content during device linking when they manipulate the WhatsApp synchronization process. 

Even though the vulnerability could have allowed crafted content to be injected or disrupted services, its real danger arose when it was combined with Apple's CVE-2025-43300, another security flaw that affects the ImageIO framework, which parses image files. In addition to this, there were also two other vulnerabilities in iOS and Mac OS that allowed out-of-bounds memory writing, which resulted in remote code execution across these systems. 

The combination of these weaknesses created a very powerful exploit chain that could deliver malicious images through the incoming message of a WhatsApp message, causing infection without the victim ever having to click, tap or interact with anything at all—a quintessential zero-click attack scenario. Investigators found that the targeting of the victims was intentional and highly selective. 

In the past, WhatsApp has confirmed that it has notified fewer than 200 people about potential threats in its apps, a number that is similar to earlier mercenary spyware operations targeting high-value users. Apple has also acknowledged active exploitation in the wild and has issued security advisories concurrently. 

Researchers from Amnesty International noted that, despite initial signs suggesting limited probing of Android devices, this campaign was mainly concerned with Apple's iOS and macOS ecosystems, and therefore was focused on those two ecosystems mainly. The implications are particularly severe for businesses.

Corporate executives, legal teams, and employees with privileged access to confidential intellectual property are at risk of being spied on or exfiltrated through using WhatsApp on their work devices, which represents a direct and potentially invisible entry point into corporate data systems. 

Cybersecurity and Infrastructure Security Agency (CISA) officials say that the vulnerability was caused by an "incomplete authorisation of linked device synchronisation messages" that existed in WhatsApp for iOS versions before version 2.25.2.173, WhatsApp Business for iOS versions of 2.25.1.78, and WhatsApp for Mac versions of 2.25.21.78. 

This flaw is believed to have been exploited by researchers as part of a complex exploit chain, which was created using the flaw in conjunction with a previously patched iOS vulnerability known as CVE-2025-43300, allowing for the delivery of spyware onto targeted devices. A U.S. government advisory has been issued urging federal employees to update their Apple devices immediately because the campaign has reportedly affected approximately 200 people. 

A new discovery adds to the growing body of evidence that advanced cyber threat actors increasingly rely on chaining multiple zero-day exploits to circumvent hardened defences and compromise remote devices. In 2024, Google's Threat Analysis Group reported 75 zero-day exploits that were actively exploited, a figure that reflects how the scale of these attacks is accelerating. 

This stealthy intrusion method continues to dominate as the year 2025 unfolds, resulting in nearly one-third of all recorded compromise attempts worldwide occurring this year. It is important for cybersecurity experts to remind us that the WhatsApp incident demonstrates once more the fragility of digital trust, even when it comes to encrypting platforms once considered to be secure. 

It has been uncovered that the attackers exploited a subtle logic flaw in WhatsApp’s device-linking system, allowing them to disguise malicious content to appear as if it was originating from the user’s own paired device, according to a technical analysis.

Through this vulnerability, a specially crafted Digital Negative (DNG) file could be delivered, which, once processed automatically by the application, could cause a series of memory corruption events that would result in remote code execution. Researchers at DarkNavyOrg have demonstrated the proof-of-concept in its fullest sense, showing how an automated script is capable of authenticating, generating the malicious DNG payload, and sending it to the intended victim without triggering any security alerts. 

In order to take advantage of the exploit, there are no visible warnings, notification pop-ups, or message notifications displayed on the user's screen. This allows attackers to gain access to messages, media, microphones, and cameras unrestrictedly, and even install spyware undetected. It has been reported to WhatsApp and Apple that the vulnerability has been found, and patches have been released to mitigate the risks. 

Despite this, security experts recommend that users install the latest updates immediately and be cautious when using unsolicited media files—even those seemingly sent by trusted contacts. In the meantime, organisations should ensure that endpoint monitoring is strengthened, that mobile device management controls are enforced, and that anomalous messaging behaviour is closely tracked until the remediation has been completed. 

There is a clear need for robust input validation, secure file handling protocols, and timely security updates to prevent silent but highly destructive attacks targeting mainstream communication platforms that can be carried out against mainstream communication platforms due to the incident. Cyber adversaries have, for a long time, been targeting companies such as WhatsApp, and WhatsApp is no exception. 

It is noteworthy that despite the platform's strong security framework and end-to-end encryption, threat actors are still hunting for new vulnerabilities to exploit. Although there are several different cyberattack types, security experts emphasise that zero-click exploits remain the most insidious, since they can compromise devices without the user having to do anything. 

V4WEB Cybersecurity founder, Riteh Bhatia, made an explanation for V4WEB's recent WhatsApp advisory, explaining that it pertains to one of these zero-click exploits--a method of attacking that does not require a victim to click, download, or applaud during the attack. Bhatia explained that, unlike phishing, where a user is required to click on a malicious link, zero-click attacks operate silently, working in the background. 

According to Bhatia, the attackers used a vulnerability in WhatsApp as well as a vulnerability in Apple's iOS to hack into targeted devices through a chain of vulnerabilities. He explained to Entrepreneur India that this process is known as chaining vulnerabilities. 

Chaining vulnerabilities allows one weakness to provide entry while the other provides control of the system as a whole. Further, Bharatia stressed that spyware deployed by these methods is capable of doing a wide range of invasive functions, such as reading messages, listening through the microphone, tracking location, and accessing the camera in real time, in addition to other invasive actions. 

As a warning sign, users might notice excessive battery drain, overheating, unusual data usage, or unexpected system crashes, all of which may indicate that the user's system is not performing optimally. Likewise, Anirudh Batra, a senior security researcher at CloudSEK, stated that zero-click vulnerabilities represent the "holy grail" for hackers, as they can be exploited seamlessly even on fully updated and ostensibly secure devices without any intervention from the target, and no action is necessary on their part.

If this vulnerability is exploited effectively, attackers will be able to have full control over the targeted devices, which will allow them to access sensitive data, monitor communications, and deploy additional malware, all without the appearance of any ill effect. As a result of this incident, it emphasises that security risks associated with complex file formats and cross-platform messaging apps persist, since flaws in file parsers continue to serve as common pathways for remote code execution.

There is a continuing investigation going on by DarkNavyOrg, including one looking into a Samsung vulnerability (CVE-2025-21043), which has been identified as a potential security concern. There was a warning from both WhatsApp and Apple that users should update their operating systems and applications immediately, and Meta confirmed that less than 200 users were notified of in-app threats. 

It has been reported that some journalists, activists, and other public figures have been targeted. Meta's spokesperson Emily Westcott stressed how important it is for users to keep their devices current and to enable WhatsApp's privacy and security features. Furthermore, Amnesty International has also noted possible Android infections and is currently conducting further investigation. 

In the past, similar spyware operations occurred, such as WhatsApp's lawsuit against Israel's NSO Group in 2019, which allegedly targeted 1,400 users with the Pegasus spyware, which later became famous for its role in global cyberespionage. While sanctions and international scrutiny have been applied to such surveillance operations, they continue to evolve, reflecting the persistent threat that advanced mobile exploits continue to pose. 

There is no doubt that the latest revelations are highlighting the need for individuals and organisations to prioritise proactive cyber security measures rather than reactive ones, as zero-click exploits are becoming more sophisticated, the traditional boundaries of digital security—once relying solely on the caution of users—are eroding rapidly. It has become increasingly important for organisations to keep constant vigilance, update their software quickly, and employ layered defence strategies to protect both their personal and business information. 

Organisations need to invest in threat intelligence solutions, continuous monitoring systems, and regular mobile security audits if they want to be on the lookout for potential threats early on. In order for individual users to reduce their exposure, they need to maintain the latest version of their devices and applications, enable built-in privacy protections, and avoid unnecessary third-party integrations. 

The WhatsApp exploit is an important reminder that even trusted, encrypted platforms may be compromised at some point. The cyber espionage industry is evolving into a silent and targeted operation, and digital trust must be reinforced through transparent processes, rapid patching, and global cooperation between tech companies and regulators. A strong defence against invisible intrusions still resides in awareness and timely action.

Digital Espionage: German Intelligence Agency's NFT Collection Sets New Recruitment Standards

 




Using non-fungible tokens (NFTs), the German Federal Intelligence Service Bundesnachrichtendienst (BND) has begun attracting cyber and blockchain talent. To help recruit qualified employees, the BND has posted nearly 1,000 NFTs with a dog motif on the Ethereum blockchain alongside an on-chain treasure hunt. 

With the rise in interest in cryptocurrency and blockchain technology in recent years, this move represents a strategic effort on the part of the company. This is to attract the most skilled cybersecurity talent available. A dog-themed collection from BND, the "Dogs of BND" collection, is a collection of traditional NFTs showing a variety of canine characters with unique personalities. Among the 999 pieces in the collection, 987 of the NFTs can be minted by individuals who succeed in the treasure hunt and are successful in collecting the coins. 

A string of hidden characters embedded by the German Defense Agency (BND) must be unraveled by prospective participants who are 13 years or older and German citizens. Research and tracking are required to identify this string, which can be a wallet address, transaction hash, block, or token number. This will uncover valuable clues that will enable the holder of the NFT collection to obtain access to the collection. 

According to the agency's website, each NFT was initially offered at a symbolic floor price of 0.000001 ETH (Ethereum) and has the opportunity to be acquired until all 987 pieces have been minted, which ensures that everyone can access the NFT program, regardless of their financial situation.  

On OpenSea, the floor price for NFTs has risen from 0.012 ETH to 0.05 ETH at the time of this report. This indicates a large spike in price. Digital tokens represent a specific agent and each token includes details about the specific skill sets the Bureau of National Statistics is seeking from the candidate. 

The collection consists of 999 generative avatar images depicting dogs of varying characteristics who are inspired by the agency's Pullach branch service dogs, Inka and Alex. PFP has many standard characteristics, including background colors, clothing, eye-gear, headgear, and hairstyles, among several others.

Even though the collection has been fully minted on the Ethereum blockchain, users will be able to acquire the pieces within it. This is done by taking part in a cryptographic treasure hunt that requires their participation. Cybersecurity is a field in which problem-solving skills are crucial. Therefore, this program aims to stimulate those skills in students.

The BND's website states that the NFTs are only able to be collected by locating a special character string that is placed on Instagram and then searching through it. An Ethereum address can be represented by this character string. An individual with this knowledge would be qualified to mint an NFT to locate the collection and obtain the collection. 

There have been accusations of misleading statements about exchange assets made by the Securities and Exchange Commission (SEC), Binance, Binance.US, and the company's CEO Changpeng Zhao against the US Securities and Exchange Commission (SEC). According to their filing in court on June 21, 2023, the SEC made misleading statements in a news release published on June 17. This led to the following lawsuit. According to them, it is their responsibility to adhere to the rules of conduct. 

CZ and Binance are alleged to have been able to commingle or divert customer assets between each other because of the motion filed in response to the SEC's claim. According to a transcript of the court proceedings, there was contradictory evidence to support this claim. There was no evidence of misappropriation or dissipation of customer assets in the filing that was submitted by Binance Holdings Limited, Zhao, and Binance's legal teams. 

A second concern was raised in the statement, which was that the SEC's press release might confuse the market and harm Binance.US customers by presenting misleading descriptions of the evidence and potentially influencing the jury pool as well. 

Guests of the German agency's website can find details of the collection on its website. Those hunters are supposed to find a string of characters (in this case, an address of a wallet, the hash of a transaction, the block or token number) hidden as a clue by the agency. The user has access to all the coins in the collection as soon as they find the correct data. 

It is estimated that it would cost less than a cent to mint NFTs (excluding gas fees), yet the floor price of the collection on OpenSea, the secondary market, is currently 0.045 Ethereum, or about $82. The collection contains 999 NFTs, but only 987 NFTs can be minted by players throughout this year. Upon the creation of all 987 tokens, the treasure hunt will be over and the hunt will have come to an end. 

There is a treasure hunt taking place spearheaded by the German cryptocurrency publication, BTC Echo. This treasure hunt is designed to identify young talent fluent in blockchain technology to combat cybercrime.

In addition to the Facebook post, it is also tapping its Instagram following to advertise NFTs, hoping to attract the attention of social media-savvy consumers. 

What Constitutes a Sensible Recruiting Strategy for Web3? 

Increasing the reach of BND's talent acquisition initiative goes beyond just targeting young professionals fluent in these areas as well. The intelligence agency also uses social media platforms to interact with followers and recruit recruits. 

As reported by BTC Echo, a German cryptocurrency publication, the move indicates the company's commitment to adjusting to the evolving digital landscape and ensuring that it complies with the requirements of cybersecurity. The BND told the outlet: "An NFT collection was an obvious new offering for our Instagram community[...] a lot of consideration is given to blockchain technology, the associated cryptocurrencies, and the use of non-fungible tokens in various areas within the BND."  

There is no doubt that in this day and age of increasing cyber threats, it is imperative to recruit competent and experienced individuals to counter such attacks. It is precisely for this reason that federal law enforcement agencies in the U.S. have recently stepped up efforts to establish a task force investigating darknet markets and crimes related to digital currencies. 

As a result of its unique recruitment strategy, BND appears to be seeking to become more than just a criminal law enforcement organization. Instead, it wants to become a company engaged in the pursuit of a forward-thinking workforce that is capable of taking on the new challenges in the digital world of the future. This initiative has served as proof that, despite the overwhelming tide of technological change that sweeps the globe, even intelligence agencies aren't immune to the effects of such a sweeping tide, irrespective of the region in which they operate.