- Judge orders Roger Stone to appear in court after his Instagram post 6 Years Ago
- I worked with the migrant caravan—and Trump is the cause of his national emergency 6 Years Ago
- How to watch Liverpool vs. Bayern Munich online for free 6 Years Ago
- ‘Patriot Act’ volume 2 proves Hasan Minhaj is the next big star of the news-comedy genre 6 Years Ago
- ‘Friends From College’ canceled after 2 seasons at Netflix 6 Years Ago
- Allow your wallet to be your spirit guide during this rad anime sale Today 10:43 AM
- Man stages fake DUI trial to propose to girlfriend, and people are asking why Today 10:40 AM
- Bernie Sanders’ website full of 404s on launch day Today 10:23 AM
- Pose’s Indya Moore goes viral for arguing trans women have ‘biologically female’ penises Today 10:21 AM
- Howard Schultz pens Medium essay declaring ‘unprecedented appetite’ for Schultz 2020 Today 9:56 AM
- The weirdest movie at the Oscars is ‘Border’ Today 9:22 AM
- Did Elon Musk just host PewDiePie’s meme review? Today 8:53 AM
- Loona stans take over Twitter with praise for the ‘Butterfly’ video Today 7:31 AM
- ‘Yucatán’ is a caper comedy that’s long on cons but short on laughs Today 7:00 AM
- The best memes of 2019 Today 7:00 AM
The app appears to have been targeted because Viber has offices in Israel.
The pro-Assad hacking group Syrian Electronic Army has followed up its apparent hack of the Tango messaging app (and the Daily Dot), with another purported hack, this time of Viber, another messaging system.
The group appears to have only hacked the support page (it remains offline), which it replaced with a statement saying, “Dear All Viber Users, The Israeli-based ‘Viber’ is spying and tracking you We weren’t able to hack all Viber systems, but most of it is designed for spying and tracking.”
London-based Viber has an R&D office in Israel.
In April we wrote about a possible vulnerability in Viber’s system that could allow a hacker to access the Android phones that carried the app. This does not seem to be related to the SEA’s accusations.
The screenshots released by the group served to illustrate how they had hacked Viber’s database. What they had hacked, said officials from the company quoted on TechCrunch, was Viber’s customer support system.
Among the information stolen were the phone numbers, IP addresses, device types, OS type and version, and registration dates of an undeclared number of users. Viber has about 200,000 users globally.
This attack, like other recent actions by the group, was a simple phishing expedition.
“Today the Viber Support site was defaced after a Viber employee unfortunately fell victim to an email phishing attack,” the company told 9to5Mac. “The phishing attack allowed access to two minor systems: a customer support panel and a support administration system.”
No sensitive user data was exposed, said the company and its databases were not hacked.
As for spying, “Viber, like many other companies such as Microsoft, Cisco, Google, and Intel maintains a development center in Israel,” according to the company. “It seems like this caused some people to come up with some pretty bizarre conspiracy theories.”
Curt Hopkins has over two decades of experience as a journalist, editorial strategist, and social media manager. His work has been published by Ars Technica, Reuters, Los Angeles Times, and San Francisco Chronicle. He is the also founding director of the Committee to Protect Bloggers, the first organization devoted to global free speech rights for bloggers