Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data

Posted on November 18, 2025November 18, 2025 By CWS

A harmful rip-off focusing on WhatsApp customers has emerged as one of many fastest-growing threats throughout messaging platforms worldwide.

The scheme exploits WhatsApp’s screen-sharing function, launched in 2023, to control customers into exposing their most delicate monetary and private info.

Experiences from the UK, India, Hong Kong, and Brazil spotlight the rip-off’s international attain, with one documented case in Hong Kong leading to a lack of HK$5.5 million, equal to US$700,000.

This social engineering assault demonstrates how even trusted communication platforms can turn out to be weapons when criminals mix psychological manipulation with technical entry to a consumer’s system.

The rip-off operates on a basis of deception reasonably than subtle malware, relying completely on human psychology to realize its targets.

Attackers place unsolicited WhatsApp video calls, impersonating financial institution representatives, Meta assist brokers, and even relations in misery.

Display screen sharing rip-off report from Brazil (Supply – Welivesecurity)

To look reliable, they spoof native cellphone numbers and intentionally disable or blur their video feed to hide their id.

The attacker then creates a false sense of urgency by claiming unauthorized fees on bank cards, suspicious account exercise, or pending verification points that require quick motion.

ESET safety researchers have recognized this rip-off as a very efficient variant of distant entry fraud that exploits three important components: belief established by an impersonated authority determine, urgency created by fabricated threats, and management granted by the screen-sharing function or distant entry purposes.

The mix of those elements offers criminals with near-complete visibility right into a consumer’s smartphone.

As soon as the sufferer agrees to share their display, the attacker’s entry turns into complete. Criminals can observe passwords, two-factor authentication codes, one-time passwords, and banking purposes in actual time.

They will seize screenshots, request the consumer to open monetary apps, and manipulate them into authorizing unauthorized financial institution transfers beneath the pretense of resolving technical points.

Extra alarmingly, attackers typically trick customers into putting in distant entry instruments like AnyDesk or TeamViewer, which grant them full management of the system.

Some victims have unknowingly put in malware corresponding to keyloggers that silently document delicate info for later exploitation.

Technical Mechanism

The Technical Mechanism Behind Account Takeover demonstrates why this assault stays so harmful. When an attacker positive aspects entry to incoming textual content messages and WhatsApp verification codes by display sharing, they’ll instantly hijack the sufferer’s WhatsApp account.

With management of the account, criminals entry saved conversations, monetary knowledge, and private contacts.

They proceed to empty banking accounts, hijack social media profiles, and impersonate victims to focus on their family and buddies with the identical rip-off, creating cascading waves of fraud.

Protection in opposition to this menace relies upon totally on consciousness and self-discipline reasonably than technical options.

Customers ought to by no means share their display with unknown callers and should independently confirm any alarming info by official channels earlier than taking motion.

Enabling two-step verification in WhatsApp by navigating to Settings → Account → Two-step verification offers essential safety by requiring a second authentication issue even when credentials are compromised.

Organizations and people should acknowledge that social engineering stays probably the most highly effective weapon in a cybercriminal’s arsenal, making skepticism and cautious judgment the strongest defenses in opposition to such assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Data, Revealing, Scam, ScreenSharing, Sensitive, Trick, Users, WhatsApp

Post navigation

Previous Post: Data Stolen in Eurofiber France Hack
Next Post: Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Related Posts

PhantomRaven Attack Involves 126 Malicious npm Packages with Over 86,000 Downloads Hiding Malicious Code Cyber Security News
ExpressVPN Windows Client Vulnerability Exposes Users Real IP Addresses With RDP Connection Cyber Security News
Doctors Imaging Group Suffers Data Breach Cyber Security News
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks
  • TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
  • Hackers Attacking Palo Alto Networks’ GlobalProtect VPN Portals with 2.3 Million Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News