Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Posted on December 8, 2025December 8, 2025 By CWS

Safety researchers have uncovered a vital privateness flaw dubbed “Careless Whisper” that lets attackers monitor consumer exercise on WhatsApp and Sign by silent supply receipts, with out alerting victims or needing prior contact.

By crafting stealthy messages like reactions to nonexistent content material or timed-out edits, adversaries set off round-trip time (RTT) responses revealing machine states, all exploitable with only a telephone quantity.

This impacts over three billion WhatsApp customers and tens of millions on Sign, enabling routine monitoring or battery drain.​

Attackers ship invisible actions, self-reactions, response removals, or invalid deletions that immediate particular person supply receipts from every goal machine, even with out ongoing chats.

These receipts expose RTT variations: roughly one second for screen-on states, two seconds when off, and 300 milliseconds if the app runs in foreground on iPhones.

Excessive-frequency pings, as much as sub-second on WhatsApp, amplify precision with out notifications, not like prior overt strategies, that are restricted by alerts.

Multi-device setups worsen leakage, as companion purchasers (net, desktop) reply individually, making it tougher to detect on-line standing shifts like desktop boot-ups signaling workplace arrival, reads the report.

In real-world exams, researchers tracked a Xiaomi telephone’s Wi-Fi/LTE switches, calls, and laptop computer syncs throughout networks.

MessengerStealthy from StrangerMulti-Gadget ProbingThreema ComparisonWhatsAppYesIndependent receiptsRestrictive, single receiptSignalYesIndependent receiptsNo spooky stranger probingThreemaNoSynchronized receiptsN/A

RTT patterns fingerprint OSes by way of receipt ordering, separate on Android/iOS WhatsApp, stacked reversed on macOS, whereas jitter distinguishes chipsets like Qualcomm versus Exynos.

Gadget fashions

Attackers infer schedules, display screen time, or app utilization, escalating from country-level geolocation in previous work to second-granularity conduct.

Offensively, outsized reactions (1MB payloads) drive 3.7MB/second site visitors, 13GB/hour silently inflating knowledge payments or draining batteries 14-18% hourly on iPhones/Samsungs. No charge limits curb sustained blasts.

Reported September 2024, Meta confirmed triage however issued no patch after 14 months; Sign ignored findings.

Researchers urge proscribing receipts to contacts, including RTT noise, consumer validation of message IDs, and server charge limits. Customers can restrict unknown messages in privateness settings as an interim protection.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Delivery, Extract, Hackers, Information, Leverage, Private, Receipts, Signal, User, WhatsApp

Post navigation

Previous Post: Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware
Next Post: Resemble AI Raises $13 Million for AI Threat Detection

Related Posts

Researchers Proposed Game-Theoretic AI for Guiding Attack and Defense Researchers Proposed Game-Theoretic AI for Guiding Attack and Defense Cyber Security News
Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild Cyber Security News
BPFDoor and Symbiote Rootkits Attacking Linux Systems Exploiting eBPF Filters BPFDoor and Symbiote Rootkits Attacking Linux Systems Exploiting eBPF Filters Cyber Security News
Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads Cyber Security News
Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Web3 Developer Environments Targeted by Social Engineering Campaign Leveraging Fake Interview Software Cyber Security News
Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News