Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities

Posted on August 7, 2025August 7, 2025 By CWS

WhatsApp has efficiently dismantled 6.8 million accounts linked to fraudulent actions in the course of the first half of 2024, representing a big escalation within the platform’s struggle in opposition to organized cybercrime. 

The takedown operation, introduced by father or mother firm Meta, particularly focused rip-off facilities working throughout Southeast Asia that regularly exploit compelled labor to execute subtle fraud schemes concentrating on international victims.

Key Takeaways1. WhatsApp eliminated fraudulent accounts from South East Asian rip-off operations.2. The platform used superior programs and an OpenAI partnership to determine rip-off content material.3. Added warnings for suspicious group invites and two-step verification.

Superior Detection Programs 

WhatsApp carried out proactive detection algorithms that recognized and neutralized malicious accounts earlier than scammers might absolutely operationalize their prison infrastructure. 

The platform launched enhanced anti-scam measures, together with automated alerts that warn customers when they’re added to group chats by contacts exterior their established community, addressing a typical assault vector utilized by cybercriminals.

The technical crackdown revealed subtle coordination between a number of platforms and synthetic intelligence programs. 

In a notable case research, WhatsApp collaborated with OpenAI’s ChatGPT to disrupt a Cambodian prison group that had weaponized the AI system to generate detailed directions for victims of a faux rent-a-scooter pyramid scheme. 

The scammers utilized ChatGPT’s pure language processing capabilities to create convincing promotional content material that lured victims with guarantees of money funds for social media engagement.

Meta’s safety infrastructure demonstrated the power to hint assault patterns throughout a number of communication channels, as fraudsters sometimes initiated contact by way of SMS earlier than migrating conversations to social media platforms and personal messaging purposes. 

The ultimate exploitation section occurred on cryptocurrency platforms and fee processors, highlighting the multi-stage nature of recent digital fraud operations.

Enhanced Safety Protocols

Shopper safety organizations acknowledged the progress whereas emphasizing the necessity for extra complete preventive measures. 

Which?, a distinguished UK client rights group, said that Meta should increase these efforts throughout its whole platform ecosystem, together with Fb and Instagram. 

Shopper regulation knowledgeable Lisa Webb criticized the reactive strategy, advocating for upstream prevention mechanisms that block fraudulent content material earlier than it reaches customers.

Regulatory stress is mounting by way of the On-line Security Act, with Ofcom anticipated to implement stricter compliance requirements for fraudulent paid ads throughout social media platforms. 

Authorities in affected areas have really helpful implementing two-step verification protocols and enhanced consumer training about recognizing suspicious messaging patterns. 

The geographic focus of those actions in Myanmar, Cambodia, and Thailand has brought on regional regulation enforcement authorities to determine specialised anti-trafficking and cybercrime sections to fight the prison enterprises’ compelled labor elements.

Equip your SOC with full entry to the newest menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Accounts, Activities, Linked, Malicious, Million, WhatsApp

Post navigation

Previous Post: Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
Next Post: New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control

Related Posts

Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News
11 Best Cloud Access Security Broker Software (CASB) Cyber Security News
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users Cyber Security News
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
  • New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control
  • WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities
  • Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ScarCruft Hacker Group Launched a New Malware Attack Using Rust and PubNub
  • Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses
  • New Ghost Calls Attack Abuses Web Conferencing for Covert Command & Control
  • WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities
  • Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News