🔒A vulnerability in the Android operating system allowed attackers to take control of a user's device through WhatsApp.
🎁The exploit involved sending a seemingly harmless GIF that triggered a reverse shell connection between the attacker's device and the victim's device.
🔄WhatsApp's parsing behavior caused the GIF to be parsed twice, leading to a double free vulnerability and memory corruption.
🔐The attacker took advantage of the memory corruption to execute arbitrary code and gain remote control over the victim's device.
🛡️The vulnerability was patched in a WhatsApp update and an update to the Android GIF library.