Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Posted on December 8, 2025December 8, 2025 By CWS

Safety researchers have uncovered a vital privateness flaw dubbed “Careless Whisper” that lets attackers monitor consumer exercise on WhatsApp and Sign by silent supply receipts, with out alerting victims or needing prior contact.

By crafting stealthy messages like reactions to nonexistent content material or timed-out edits, adversaries set off round-trip time (RTT) responses revealing machine states, all exploitable with only a telephone quantity.

This impacts over three billion WhatsApp customers and tens of millions on Sign, enabling routine monitoring or battery drain.​

Attackers ship invisible actions, self-reactions, response removals, or invalid deletions that immediate particular person supply receipts from every goal machine, even with out ongoing chats.

These receipts expose RTT variations: roughly one second for screen-on states, two seconds when off, and 300 milliseconds if the app runs in foreground on iPhones.

Excessive-frequency pings, as much as sub-second on WhatsApp, amplify precision with out notifications, not like prior overt strategies, that are restricted by alerts.

Multi-device setups worsen leakage, as companion purchasers (net, desktop) reply individually, making it tougher to detect on-line standing shifts like desktop boot-ups signaling workplace arrival, reads the report.

In real-world exams, researchers tracked a Xiaomi telephone’s Wi-Fi/LTE switches, calls, and laptop computer syncs throughout networks.

MessengerStealthy from StrangerMulti-Gadget ProbingThreema ComparisonWhatsAppYesIndependent receiptsRestrictive, single receiptSignalYesIndependent receiptsNo spooky stranger probingThreemaNoSynchronized receiptsN/A

RTT patterns fingerprint OSes by way of receipt ordering, separate on Android/iOS WhatsApp, stacked reversed on macOS, whereas jitter distinguishes chipsets like Qualcomm versus Exynos.

Gadget fashions

Attackers infer schedules, display screen time, or app utilization, escalating from country-level geolocation in previous work to second-granularity conduct.

Offensively, outsized reactions (1MB payloads) drive 3.7MB/second site visitors, 13GB/hour silently inflating knowledge payments or draining batteries 14-18% hourly on iPhones/Samsungs. No charge limits curb sustained blasts.

Reported September 2024, Meta confirmed triage however issued no patch after 14 months; Sign ignored findings.

Researchers urge proscribing receipts to contacts, including RTT noise, consumer validation of message IDs, and server charge limits. Customers can restrict unknown messages in privateness settings as an interim protection.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Delivery, Extract, Hackers, Information, Leverage, Private, Receipts, Signal, User, WhatsApp

Post navigation

Previous Post: Hackers Leverage Multiple Ad Networks to Attack Adroid Users With Triada Malware
Next Post: Resemble AI Raises $13 Million for AI Threat Detection

Related Posts

SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed SonicWall Urges Customers to Reset Login Credentials After Configuration Backup Files Exposed Cyber Security News
Lazarus Hackers Actively Attacking European Drone Manufacturing Companies Lazarus Hackers Actively Attacking European Drone Manufacturing Companies Cyber Security News
Phishing Alert: GitHub Notifications Misused by Hackers Phishing Alert: GitHub Notifications Misused by Hackers Cyber Security News
Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Tata-Owned Jaguar Land Rover Delays Factory Reopening Following Major Cyber Attack Cyber Security News
Critical cPanel Vulnerability Exploited, Thousands at Risk Critical cPanel Vulnerability Exploited, Thousands at Risk Cyber Security News
A Buyer’s Guide for CISOs A Buyer’s Guide for CISOs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark