Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities

WhatsApp Has Taken Down 6.8 Million Accounts Linked to Malicious Activities

Posted on August 7, 2025August 7, 2025 By CWS

WhatsApp has efficiently dismantled 6.8 million accounts linked to fraudulent actions in the course of the first half of 2024, representing a big escalation within the platform’s struggle in opposition to organized cybercrime. 

The takedown operation, introduced by father or mother firm Meta, particularly focused rip-off facilities working throughout Southeast Asia that regularly exploit compelled labor to execute subtle fraud schemes concentrating on international victims.

Key Takeaways1. WhatsApp eliminated fraudulent accounts from South East Asian rip-off operations.2. The platform used superior programs and an OpenAI partnership to determine rip-off content material.3. Added warnings for suspicious group invites and two-step verification.

Superior Detection Programs 

WhatsApp carried out proactive detection algorithms that recognized and neutralized malicious accounts earlier than scammers might absolutely operationalize their prison infrastructure. 

The platform launched enhanced anti-scam measures, together with automated alerts that warn customers when they’re added to group chats by contacts exterior their established community, addressing a typical assault vector utilized by cybercriminals.

The technical crackdown revealed subtle coordination between a number of platforms and synthetic intelligence programs. 

In a notable case research, WhatsApp collaborated with OpenAI’s ChatGPT to disrupt a Cambodian prison group that had weaponized the AI system to generate detailed directions for victims of a faux rent-a-scooter pyramid scheme. 

The scammers utilized ChatGPT’s pure language processing capabilities to create convincing promotional content material that lured victims with guarantees of money funds for social media engagement.

Meta’s safety infrastructure demonstrated the power to hint assault patterns throughout a number of communication channels, as fraudsters sometimes initiated contact by way of SMS earlier than migrating conversations to social media platforms and personal messaging purposes. 

The ultimate exploitation section occurred on cryptocurrency platforms and fee processors, highlighting the multi-stage nature of recent digital fraud operations.

Enhanced Safety Protocols

Shopper safety organizations acknowledged the progress whereas emphasizing the necessity for extra complete preventive measures. 

Which?, a distinguished UK client rights group, said that Meta should increase these efforts throughout its whole platform ecosystem, together with Fb and Instagram. 

Shopper regulation knowledgeable Lisa Webb criticized the reactive strategy, advocating for upstream prevention mechanisms that block fraudulent content material earlier than it reaches customers.

Regulatory stress is mounting by way of the On-line Security Act, with Ofcom anticipated to implement stricter compliance requirements for fraudulent paid ads throughout social media platforms. 

Authorities in affected areas have really helpful implementing two-step verification protocols and enhanced consumer training about recognizing suspicious messaging patterns. 

The geographic focus of those actions in Myanmar, Cambodia, and Thailand has brought on regional regulation enforcement authorities to determine specialised anti-trafficking and cybercrime sections to fight the prison enterprises’ compelled labor elements.

Equip your SOC with full entry to the newest menace information from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Accounts, Activities, Linked, Malicious, Million, WhatsApp

Post navigation

Previous Post: Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
Next Post: CISA Warns of ‘ToolShell’ Exploits Chain Attacks SharePoint Servers

Related Posts

Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Louis Vuitton Hacked – Attackers Stolen Customers Personal Data Cyber Security News
Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Cyber Security News
Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands Cyber Security News
Advanced Endpoint Threat Detection in 2025 Network Environments Advanced Endpoint Threat Detection in 2025 Network Environments Cyber Security News
Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Microsoft Rolls Out Windows 11 Cumulative Updates KB5058411 and KB5058405 Cyber Security News
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News