Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number

New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number

Posted on December 16, 2025December 16, 2025 By CWS

A newly found account takeover marketing campaign focusing on WhatsApp customers demonstrates how attackers can compromise messaging accounts with out stealing passwords or exploiting technical vulnerabilities.

The risk, recognized because the GhostPairing Assault, makes use of social engineering and WhatsApp’s reputable system linking function to grant attackers full entry to sufferer accounts.

The marketing campaign first emerged in Czechia however exhibits no geographic limitations, with attackers utilizing reusable kits to scale their operations throughout a number of international locations and languages.

The assault begins when victims obtain messages from identified contacts, sometimes suggesting they’ve discovered a photograph. The message features a hyperlink designed to seem as a Fb content material viewer.

Lure message (Supply – Gen Digital)

When customers click on the hyperlink, they encounter a faux Fb-themed web page requesting verification earlier than accessing content material.

This acquainted interface creates a false sense of legitimacy that encourages customers to finish the verification course of with out questioning its authenticity.

Gen Digital analysts and researchers found that the assault exploits WhatsApp’s system pairing function, which permits customers to hyperlink extra gadgets similar to internet browsers and desktop functions to their accounts.

Somewhat than counting on technical exploits or credential theft, attackers trick customers into willingly approving an unauthorized system connection.

An infection mechanism

The an infection mechanism depends on WhatsApp’s telephone quantity and numeric pairing code circulate, making this assault significantly efficient.

When customers enter their telephone quantity on the faux web page, the attacker’s infrastructure intercepts the request and forwards it to WhatsApp’s reputable system linking endpoint.

Pretend Fb web page (Supply – Gen Digital)

WhatsApp generates a pairing code supposed just for the account proprietor, however the attacker’s web site shows this code to the sufferer alongside directions to enter it in WhatsApp to finish the login verification.

From the sufferer’s perspective, this seems equivalent to plain two-factor authentication. As soon as the sufferer enters the code of their precise WhatsApp utility, they unknowingly approve the attacker’s browser as a linked system.

Code despatched by attackers to compromise sufferer’s’ WhatsApp account (Supply – Gen Digital)

The attacker now has persistent entry to all historic conversations, incoming messages, photographs, movies, and delicate info shared within the account, whereas remaining utterly invisible to the account holder.

The persistent nature of this entry makes the assault significantly harmful. Not like conventional account hijacking that locks out reputable customers, GhostPairing permits attackers to watch conversations and collect intelligence indefinitely.

Compromised accounts turn out to be propagation vectors, enabling attackers to ship the identical lure messages to the sufferer’s contacts, making a snowball impact that multiplies the assault’s attain.

Customers can defend themselves by commonly checking their linked gadgets in WhatsApp Settings and eradicating unknown classes, treating any exterior requests to scan QR codes or enter pairing codes as instantly suspicious, and enabling Two-Step Verification for extra account safety.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Attack, Attackers, Full, Gain, GhostPairing, Number, Phone, WhatsApp

Post navigation

Previous Post: React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
Next Post: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

Related Posts

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data Cyber Security News
Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Threat Actors Exploitation Attempts Spikes as an Early Indicator of New Cyber Vulnerabilities Cyber Security News
New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands Cyber Security News
Top 10 Best VPN Services of 2026 Top 10 Best VPN Services of 2026 Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News
Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Dark Web Omertà Market Shut Downed Following the Leak of Real Server IPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News