Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data

Posted on November 18, 2025November 18, 2025 By CWS

A harmful rip-off focusing on WhatsApp customers has emerged as one of many fastest-growing threats throughout messaging platforms worldwide.

The scheme exploits WhatsApp’s screen-sharing function, launched in 2023, to control customers into exposing their most delicate monetary and private info.

Experiences from the UK, India, Hong Kong, and Brazil spotlight the rip-off’s international attain, with one documented case in Hong Kong leading to a lack of HK$5.5 million, equal to US$700,000.

This social engineering assault demonstrates how even trusted communication platforms can turn out to be weapons when criminals mix psychological manipulation with technical entry to a consumer’s system.

The rip-off operates on a basis of deception reasonably than subtle malware, relying completely on human psychology to realize its targets.

Attackers place unsolicited WhatsApp video calls, impersonating financial institution representatives, Meta assist brokers, and even relations in misery.

Display screen sharing rip-off report from Brazil (Supply – Welivesecurity)

To look reliable, they spoof native cellphone numbers and intentionally disable or blur their video feed to hide their id.

The attacker then creates a false sense of urgency by claiming unauthorized fees on bank cards, suspicious account exercise, or pending verification points that require quick motion.

ESET safety researchers have recognized this rip-off as a very efficient variant of distant entry fraud that exploits three important components: belief established by an impersonated authority determine, urgency created by fabricated threats, and management granted by the screen-sharing function or distant entry purposes.

The mix of those elements offers criminals with near-complete visibility right into a consumer’s smartphone.

As soon as the sufferer agrees to share their display, the attacker’s entry turns into complete. Criminals can observe passwords, two-factor authentication codes, one-time passwords, and banking purposes in actual time.

They will seize screenshots, request the consumer to open monetary apps, and manipulate them into authorizing unauthorized financial institution transfers beneath the pretense of resolving technical points.

Extra alarmingly, attackers typically trick customers into putting in distant entry instruments like AnyDesk or TeamViewer, which grant them full management of the system.

Some victims have unknowingly put in malware corresponding to keyloggers that silently document delicate info for later exploitation.

Technical Mechanism

The Technical Mechanism Behind Account Takeover demonstrates why this assault stays so harmful. When an attacker positive aspects entry to incoming textual content messages and WhatsApp verification codes by display sharing, they’ll instantly hijack the sufferer’s WhatsApp account.

With management of the account, criminals entry saved conversations, monetary knowledge, and private contacts.

They proceed to empty banking accounts, hijack social media profiles, and impersonate victims to focus on their family and buddies with the identical rip-off, creating cascading waves of fraud.

Protection in opposition to this menace relies upon totally on consciousness and self-discipline reasonably than technical options.

Customers ought to by no means share their display with unknown callers and should independently confirm any alarming info by official channels earlier than taking motion.

Enabling two-step verification in WhatsApp by navigating to Settings → Account → Two-step verification offers essential safety by requiring a second authentication issue even when credentials are compromised.

Organizations and people should acknowledge that social engineering stays probably the most highly effective weapon in a cybercriminal’s arsenal, making skepticism and cautious judgment the strongest defenses in opposition to such assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Data, Revealing, Scam, ScreenSharing, Sensitive, Trick, Users, WhatsApp

Post navigation

Previous Post: Data Stolen in Eurofiber France Hack
Next Post: Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Related Posts

Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data Cyber Security News
Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program Cyber Security News
Huge Surge in Fake Investment Platforms Mimic Forex Exchanges Steal Logins Cyber Security News
Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS Cyber Security News
How AI Is Redefining Threat Detection In The Cloud Era Cyber Security News
Threat Actors Adapting Android Droppers Even to Deploy Simple Malware to Stay Future-Proof Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • Cline AI Coding Agent Vulnerabilities Enables Prompt Injection, Code Execution, and Data Leakage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News