Sign messenger has investigated rumors spreading on-line over the weekend of a zero-day safety vulnerability associated to the ‘Generate Hyperlink Previews’ characteristic, stating that there isn’t a proof this vulnerability is actual.
This assertion comes after quite a few sources advised BleepingComputer and reported on Twitter {that a} new zero-day vulnerability allowed for a full takeover of gadgets.
After contacting Sign in regards to the zero-day final evening, they launched an announcement on Twitter stating that they’ve investigated the rumors and have discovered no proof that this flaw is actual.
“PSA: we now have seen the imprecise viral stories alleging a Sign 0-day vulnerability, reads an announcement on Twitter.
“After accountable investigation *we now have no proof that means this vulnerability is actual* nor has any more information been shared by way of our official reporting channels.”
“We additionally checked with individuals throughout US Authorities, for the reason that copy-paste report claimed USG as a supply. These we spoke to haven’t any data suggesting this can be a legitimate declare,”
Citing US authorities sources, information of the alleged zero-day rapidly unfold on-line and among the many cybersecurity neighborhood Saturday afternoon.
These unnamed USG sources mentioned that the vulnerability may very well be mitigated by disabling the ‘Generate Hyperlink Previews’ setting in Sign.

Supply: BleepingComputer
Nevertheless, BleepingComputer couldn’t verify the validity of those statements, despite the fact that we heard it from quite a few individuals claiming the identical sources.
Whereas Sign has acknowledged that they haven’t any proof of a brand new zero-day, they nonetheless request that these with new and “actual” data contact their safety workforce.
As that is an ongoing investigation, and the mitigation is to easily disable the Hyperlink Previews characteristic, customers might need to flip this setting off in the meanwhile till it is totally confirmed to not be actual.