WhatsApp and Telegram web clients had a vulnerability, already fixed, that allowed third parties to access accounts

Before you ask, yes, this is another one of those matters in which the moral of the story: all little care.

After all, especially in the vast and insane world of the internet, it never hurts to reinforce this maxim, right?

Let's get to the facts: Check Point, a company specializing in security software, discovered a vulnerability in the web clients of two of the most used instant messengers in the world, the WhatsApp Messenger it's the Telegram.

And this is not just any loophole that allows partial access to one or another unimportant information from the user: we are talking about a gateway for evildoers to gain full access to their account, including the ability to access conversation history, photos and contacts .

In WhatsApp Web, the intrusion was performed with a simple malicious file shared with the target that, when opened in the browser, gave immediate access to the hacker's account on the service.

In the original post reporting the failure, Check Point gives all the details of how it was possible to perform the feat, but as you can see from the video above, once the malware, there is no mystery in the process, everything happens instantly.

In the case of Telegram, the process is a little more complicated, involving an infected video and the need for the user to be hacked to click the right button on the screen to open the file in a new tab.

Still, nothing is impossible to happen.

Before you run out into the hills (or, I don't know, try to take advantage of the loophole in this case, which is a shame), it is good to warn beforehand that the flaw has already been corrected by the developers of both services.

Still, we go back to the beginning of the text: all little care, especially when it comes to clicking on files unknown to anyone on the internet.

Stay tuned.

(via 9to5Mac)