Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Posted on December 8, 2025December 8, 2025 By CWS

Safety researchers have uncovered a vital privateness flaw dubbed “Careless Whisper” that lets attackers monitor consumer exercise on WhatsApp and Sign by silent supply receipts, with out alerting victims or needing prior contact.

By crafting stealthy messages like reactions to nonexistent content material or timed-out edits, adversaries set off round-trip time (RTT) responses revealing machine states, all exploitable with only a telephone quantity.

This impacts over three billion WhatsApp customers and tens of millions on Sign, enabling routine monitoring or battery drain.​

Attackers ship invisible actions, self-reactions, response removals, or invalid deletions that immediate particular person supply receipts from every goal machine, even with out ongoing chats.

These receipts expose RTT variations: roughly one second for screen-on states, two seconds when off, and 300 milliseconds if the app runs in foreground on iPhones.

Excessive-frequency pings, as much as sub-second on WhatsApp, amplify precision with out notifications, not like prior overt strategies, that are restricted by alerts.

Multi-device setups worsen leakage, as companion purchasers (net, desktop) reply individually, making it tougher to detect on-line standing shifts like desktop boot-ups signaling workplace arrival, reads the report.

In real-world exams, researchers tracked a Xiaomi telephone’s Wi-Fi/LTE switches, calls, and laptop computer syncs throughout networks.

MessengerStealthy from StrangerMulti-Gadget ProbingThreema ComparisonWhatsAppYesIndependent receiptsRestrictive, single receiptSignalYesIndependent receiptsNo spooky stranger probingThreemaNoSynchronized receiptsN/A

RTT patterns fingerprint OSes by way of receipt ordering, separate on Android/iOS WhatsApp, stacked reversed on macOS, whereas jitter distinguishes chipsets like Qualcomm versus Exynos.

Gadget fashions

Attackers infer schedules, display screen time, or app utilization, escalating from country-level geolocation in previous work to second-granularity conduct.

Offensively, outsized reactions (1MB payloads) drive 3.7MB/second site visitors, 13GB/hour silently inflating knowledge payments or draining batteries 14-18% hourly on iPhones/Samsungs. No charge limits curb sustained blasts.

Reported September 2024, Meta confirmed triage however issued no patch after 14 months; Sign ignored findings.

Researchers urge proscribing receipts to contacts, including RTT noise, consumer validation of message IDs, and server charge limits. Customers can restrict unknown messages in privateness settings as an interim protection.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Delivery, Extract, Hackers, Information, Leverage, Private, Receipts, Signal, User, WhatsApp

Post navigation

Previous Post: Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware
Next Post: Resemble AI Raises $13 Million for AI Threat Detection

Related Posts

Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques Researchers Reversed Asgard Malware Protector to Uncover it’s Antivirus Bypass Techniques Cyber Security News
Best MSP Software: The Essential Tech Stack  Best MSP Software: The Essential Tech Stack  Cyber Security News
Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Multiple GitLab Vulnerabilities Let Attackers Inject Malicious Prompts to Steal Sensitive Data Cyber Security News
Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Cyber Security News
Guided Selling in 3D Product Configurators Guided Selling in 3D Product Configurators Cyber Security News
Hackers Exploit Screensavers for Remote Access Hackers Exploit Screensavers for Remote Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark