Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data

WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data

Posted on November 18, 2025November 18, 2025 By CWS

A harmful rip-off focusing on WhatsApp customers has emerged as one of many fastest-growing threats throughout messaging platforms worldwide.

The scheme exploits WhatsApp’s screen-sharing function, launched in 2023, to control customers into exposing their most delicate monetary and private info.

Experiences from the UK, India, Hong Kong, and Brazil spotlight the rip-off’s international attain, with one documented case in Hong Kong leading to a lack of HK$5.5 million, equal to US$700,000.

This social engineering assault demonstrates how even trusted communication platforms can turn out to be weapons when criminals mix psychological manipulation with technical entry to a consumer’s system.

The rip-off operates on a basis of deception reasonably than subtle malware, relying completely on human psychology to realize its targets.

Attackers place unsolicited WhatsApp video calls, impersonating financial institution representatives, Meta assist brokers, and even relations in misery.

Display screen sharing rip-off report from Brazil (Supply – Welivesecurity)

To look reliable, they spoof native cellphone numbers and intentionally disable or blur their video feed to hide their id.

The attacker then creates a false sense of urgency by claiming unauthorized fees on bank cards, suspicious account exercise, or pending verification points that require quick motion.

ESET safety researchers have recognized this rip-off as a very efficient variant of distant entry fraud that exploits three important components: belief established by an impersonated authority determine, urgency created by fabricated threats, and management granted by the screen-sharing function or distant entry purposes.

The mix of those elements offers criminals with near-complete visibility right into a consumer’s smartphone.

As soon as the sufferer agrees to share their display, the attacker’s entry turns into complete. Criminals can observe passwords, two-factor authentication codes, one-time passwords, and banking purposes in actual time.

They will seize screenshots, request the consumer to open monetary apps, and manipulate them into authorizing unauthorized financial institution transfers beneath the pretense of resolving technical points.

Extra alarmingly, attackers typically trick customers into putting in distant entry instruments like AnyDesk or TeamViewer, which grant them full management of the system.

Some victims have unknowingly put in malware corresponding to keyloggers that silently document delicate info for later exploitation.

Technical Mechanism

The Technical Mechanism Behind Account Takeover demonstrates why this assault stays so harmful. When an attacker positive aspects entry to incoming textual content messages and WhatsApp verification codes by display sharing, they’ll instantly hijack the sufferer’s WhatsApp account.

With management of the account, criminals entry saved conversations, monetary knowledge, and private contacts.

They proceed to empty banking accounts, hijack social media profiles, and impersonate victims to focus on their family and buddies with the identical rip-off, creating cascading waves of fraud.

Protection in opposition to this menace relies upon totally on consciousness and self-discipline reasonably than technical options.

Customers ought to by no means share their display with unknown callers and should independently confirm any alarming info by official channels earlier than taking motion.

Enabling two-step verification in WhatsApp by navigating to Settings → Account → Two-step verification offers essential safety by requiring a second authentication issue even when credentials are compromised.

Organizations and people should acknowledge that social engineering stays probably the most highly effective weapon in a cybercriminal’s arsenal, making skepticism and cautious judgment the strongest defenses in opposition to such assaults.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attackers, Data, Revealing, Scam, ScreenSharing, Sensitive, Trick, Users, WhatsApp

Post navigation

Previous Post: Data Stolen in Eurofiber France Hack
Next Post: Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Related Posts

Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Cyber Security News
GitLab Security Update – Patch For Multiple Vulnerabilities That Enables DoS Attack GitLab Security Update – Patch For Multiple Vulnerabilities That Enables DoS Attack Cyber Security News
Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Cyber Security News
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks Cyber Security News
Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections Storm-2603 Using Custom Malware That Leverages BYOVD to Tamper with Endpoint Protections Cyber Security News
Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Researchers Expose Scattered Spider’s Tools, Techniques and Key Indicators Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News