Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information

Posted on December 8, 2025December 8, 2025 By CWS

Safety researchers have uncovered a vital privateness flaw dubbed “Careless Whisper” that lets attackers monitor consumer exercise on WhatsApp and Sign by silent supply receipts, with out alerting victims or needing prior contact.

By crafting stealthy messages like reactions to nonexistent content material or timed-out edits, adversaries set off round-trip time (RTT) responses revealing machine states, all exploitable with only a telephone quantity.

This impacts over three billion WhatsApp customers and tens of millions on Sign, enabling routine monitoring or battery drain.​

Attackers ship invisible actions, self-reactions, response removals, or invalid deletions that immediate particular person supply receipts from every goal machine, even with out ongoing chats.

These receipts expose RTT variations: roughly one second for screen-on states, two seconds when off, and 300 milliseconds if the app runs in foreground on iPhones.

Excessive-frequency pings, as much as sub-second on WhatsApp, amplify precision with out notifications, not like prior overt strategies, that are restricted by alerts.

Multi-device setups worsen leakage, as companion purchasers (net, desktop) reply individually, making it tougher to detect on-line standing shifts like desktop boot-ups signaling workplace arrival, reads the report.

In real-world exams, researchers tracked a Xiaomi telephone’s Wi-Fi/LTE switches, calls, and laptop computer syncs throughout networks.

MessengerStealthy from StrangerMulti-Gadget ProbingThreema ComparisonWhatsAppYesIndependent receiptsRestrictive, single receiptSignalYesIndependent receiptsNo spooky stranger probingThreemaNoSynchronized receiptsN/A

RTT patterns fingerprint OSes by way of receipt ordering, separate on Android/iOS WhatsApp, stacked reversed on macOS, whereas jitter distinguishes chipsets like Qualcomm versus Exynos.

Gadget fashions

Attackers infer schedules, display screen time, or app utilization, escalating from country-level geolocation in previous work to second-granularity conduct.

Offensively, outsized reactions (1MB payloads) drive 3.7MB/second site visitors, 13GB/hour silently inflating knowledge payments or draining batteries 14-18% hourly on iPhones/Samsungs. No charge limits curb sustained blasts.

Reported September 2024, Meta confirmed triage however issued no patch after 14 months; Sign ignored findings.

Researchers urge proscribing receipts to contacts, including RTT noise, consumer validation of message IDs, and server charge limits. Customers can restrict unknown messages in privateness settings as an interim protection.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Delivery, Extract, Hackers, Information, Leverage, Private, Receipts, Signal, User, WhatsApp

Post navigation

Previous Post: The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
Next Post: CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary

Related Posts

Conversation with Amazon’s Senior Software Development Engineer Naman Jain Cyber Security News
Cisco Unified Contact Center Express Vulnerabilities Let Remote Attacker Execute Malicious Code Cyber Security News
Silver Fox Hackers Using Weaponized Google Translate Tools to Deploy Windows Malware Cyber Security News
Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News
HR Giant Workday Discloses Data Breach After Hackers Compromise Third-Party CRM Cyber Security News
Microsoft Azure Faces Global Outage Affecting Services Worldwide Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISO Conversations: Keith McCammon, CSO and Co-founder at Red Canary
  • Hackers Can Leverage Delivery Receipts on WhatsApp and Signal to Extract User Private Information
  • The ‘Kitten’ Project – Hacktivist Groups Carrying Out Attacks Targeting Israel
  • Tri-Century Eye Care Data Breach Impacts 200,000 Individuals
  • USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark