Both Ibrahim Baggili and Jason Moore, researchers from the University of New Haven’s Cyber Forensics Research & Education Group, did show off how Viber’s open transmission of the data happened recently. They managed to both data and links to the online location through the interception of traffic on a Windows 7 PC which was specially set up as a wireless access point for one of the smartphones which saw action in the test.
Of course, gaining access to the transmitted data is not a walk in the park, but attackers with the necessary technical know how are able to achieve their nefarious objective by setting up malicious wireless access points, or perhaps to fall back upon man-in-the-middle attacks by intercepting network traffic. Viber has since commented on the situation, touting that it is already in the middle of fixing the issue.