Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number

Posted on December 16, 2025December 16, 2025 By CWS

A newly found account takeover marketing campaign focusing on WhatsApp customers demonstrates how attackers can compromise messaging accounts with out stealing passwords or exploiting technical vulnerabilities.

The risk, recognized because the GhostPairing Assault, makes use of social engineering and WhatsApp’s reputable system linking function to grant attackers full entry to sufferer accounts.

The marketing campaign first emerged in Czechia however exhibits no geographic limitations, with attackers utilizing reusable kits to scale their operations throughout a number of international locations and languages.

The assault begins when victims obtain messages from identified contacts, sometimes suggesting they’ve discovered a photograph. The message features a hyperlink designed to seem as a Fb content material viewer.

Lure message (Supply – Gen Digital)

When customers click on the hyperlink, they encounter a faux Fb-themed web page requesting verification earlier than accessing content material.

This acquainted interface creates a false sense of legitimacy that encourages customers to finish the verification course of with out questioning its authenticity.

Gen Digital analysts and researchers found that the assault exploits WhatsApp’s system pairing function, which permits customers to hyperlink extra gadgets similar to internet browsers and desktop functions to their accounts.

Somewhat than counting on technical exploits or credential theft, attackers trick customers into willingly approving an unauthorized system connection.

An infection mechanism

The an infection mechanism depends on WhatsApp’s telephone quantity and numeric pairing code circulate, making this assault significantly efficient.

When customers enter their telephone quantity on the faux web page, the attacker’s infrastructure intercepts the request and forwards it to WhatsApp’s reputable system linking endpoint.

Pretend Fb web page (Supply – Gen Digital)

WhatsApp generates a pairing code supposed just for the account proprietor, however the attacker’s web site shows this code to the sufferer alongside directions to enter it in WhatsApp to finish the login verification.

From the sufferer’s perspective, this seems equivalent to plain two-factor authentication. As soon as the sufferer enters the code of their precise WhatsApp utility, they unknowingly approve the attacker’s browser as a linked system.

Code despatched by attackers to compromise sufferer’s’ WhatsApp account (Supply – Gen Digital)

The attacker now has persistent entry to all historic conversations, incoming messages, photographs, movies, and delicate info shared within the account, whereas remaining utterly invisible to the account holder.

The persistent nature of this entry makes the assault significantly harmful. Not like conventional account hijacking that locks out reputable customers, GhostPairing permits attackers to watch conversations and collect intelligence indefinitely.

Compromised accounts turn out to be propagation vectors, enabling attackers to ship the identical lure messages to the sufferer’s contacts, making a snowball impact that multiplies the assault’s attain.

Customers can defend themselves by commonly checking their linked gadgets in WhatsApp Settings and eradicating unknown classes, treating any exterior requests to scan QR codes or enter pairing codes as instantly suspicious, and enabling Two-Step Verification for extra account safety.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Attack, Attackers, Full, Gain, GhostPairing, Number, Phone, WhatsApp

Post navigation

Previous Post: React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
Next Post: In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

Related Posts

Cisco Nexus Dashboard Fabric Controller Vulnerability Allows Attackers Device Impersonate as Managed Devices Cyber Security News
APT Hackers Attacking Maritime and Shipping Industry to Launch Ransomware Attacks Cyber Security News
Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution Cyber Security News
Microsoft Warns of Hackers Using ClickFix Technique to Attack Windows and macOS Devices Cyber Security News
Threat Actor Allegedly Claim Leak of NordVPN Salesforce Database with Source Codes Cyber Security News
Dark Web Job Market Evolved Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark