Security

Patches

WhatsApp still working on making View Once chats actually disappear for all

So far it's more like View Forever


Updated Meta's efforts to stop people repeatedly viewing WhatsApp’s so-called View Once messages – photos, videos, and voice recordings that disappear from chats after a recipient sees them – so far remain incomplete.

An interim fix deployed to stop people keeping hold of View Once data has been defeated in less than a week by white-hat hackers. WhatsApp says it's still working on addressing the vulnerability in full and changes made so far are stop-gap measures.

View Once was introduced in August 2021 as an optional privacy measure. But last week security flaw finders at cryptowallet startup Zengo went public with ways to revive seemingly self-destructed View Once material.

Zengo used Meta's bug bounty program in August to report the security weakness to WhatsApp, and heard nothing back. After spotting multiple pieces of software that were designed to exploit this flaw and harvest supposedly self-destructing pictures, the crypto concern publicly disclosed the details.

Essentially, the API servers treat View Once messages as normal messages but with a flag on them saying: Please only show this once. A rogue app or browser extension able to talk to those servers could just ignore that request, allowing the user to keep the data.

As a result of the disclosure, WhatsApp tweaked its code a few days later to make it harder to get around the View Once requirements, and at first it appeared to have worked. Users of browser extensions that exploited the initial weakness to circumvent View Once complained their content-saving tools no longer worked.

Zengo re-investigated the issue and confirmed the update by Meta was incomplete, and said the root vulnerability allowing miscreants to keep View Once data was still there.

"While generally the fix was a good initial step in the right direction by Meta’s WhatsApp, it is still not enough," Zengo cofounder Tal Be'ery wrote in an explainer on Monday. "The core issue of the View Once media message containing all the information required to view it, in an environment that should not be able to show it, still remains unsolved."

As we said, the problem is that if you're able to make a client that imitates an official WhatsApp app, or able to manipulate the WhatsApp web app with an extension, the API service will trust your program to do the right thing when it receives a View Once message.

Though your humble vulture will refrain from going into too much detail about a not-fully-patched privacy hole at this stage, the video below shows this is not a terrifyingly complex shortcoming to exploit.

"We have shown it can be done," Be'ery told The Register. "So we assume others will be able to do that too."

Sure enough, one of the developers of a View Once exploit confirmed they have found a method to get around the updated WhatsApp code and will be publishing a new browser extension shortly.

The fundamental problem is that these supposedly evaporating messages are still being sent to platforms that shouldn't be getting them, Be'ery said. Until Meta changes that, the problem looks likely to persist. He said he was also disappointed that after all this Meta still hadn't got in touch with Zengo, despite its bug bounty terms of service promising frequent communication on submissions.

Meta declined to comment to The Register.

Sources familiar with the situation, however, told us the fix implemented to date was only meant to be an interim measure and a more comprehensive code revamp is under way. ®

Updated to add at 1815 UTC on September 18

Meta has assured us it's still working on addressing the privacy shortcomings reported by Zengo, and that's why the fix is so far incomplete. "As we said before, we are in the process of rolling out updates to View Once on web. Those additional updates are forthcoming," a spokesperson for WhatsApp told The Register.

Be'ery meanwhile said he was disappointingly awarded zero dollars by Meta's bug bounty program for pointing out a circumvention of WhatsApp's disappearing-messages feature that was being actively exploited in the wild.

That's because, according to Meta, the biz was already aware of the security failing and was trying to address it when he disclosed the issue to them.

Be'ery believes WhatsApp will try to fix this snafu by killing off View Once for its web client, thus stopping browser extension-based exploitation, though modified WhatsApp Android apps that ignore the View Once requirements, for example, will continue to be able to harvest supposedly self-destructing messages.

Send us news
16 Comments

Russia's Star Blizzard phishing crew caught targeting WhatsApp accounts

FSB cyberspies venture into a new app for espionage, Microsoft says

Zuck takes a page from Musk: Meta dumps fact-checkers, loosens speech restrictions

'We're going to catch less bad stuff,' Facebook tycoon admits, but it's worth it to get Trump off his back

New Orleans attacker used Meta smart glasses to plan New Year's Day massacre

But Jabbar did not live stream his actions on Jan 1, FBI confirmed

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

We did warn you – 2025 may be the year AI bots take over Meta's 'verse

Can't grow any more? Let's just invent engagement!

Court docs allege Meta trained its AI models on contentious trove of maybe-pirated content

Did Zuck’s definition of ‘free expression’ just get even broader?

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys