Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

Posted on November 20, 2025November 20, 2025 By CWS

Nov 20, 2025The Hacker NewsOnline Fraud / Internet Safety
CTM360 has recognized a quickly increasing WhatsApp account-hacking marketing campaign focusing on customers worldwide by way of a community of misleading authentication portals and impersonation pages. The marketing campaign, internally dubbed HackOnChat, abuses WhatsApp’s acquainted internet interface, utilizing social engineering ways to trick customers into compromising their accounts.
Investigators recognized 1000’s of malicious URLs being hosted on cheap top-level domains and quickly generated by means of trendy website-building platforms, permitting attackers to deploy new pages at scale. The marketing campaign’s exercise logs present a whole bunch of incidents in latest weeks, with a noticeable surge throughout the Center East and Asia.
Learn the total report right here:
The hacking operations and the exploitation strategies
Two strategies dominate these hacking operations. The Session Hijacking, the place menace actors misuse the linked-device performance to hijack energetic WhatsApp Internet periods, and Account Takeover, which includes deceiving victims into surrendering authentication keys, granting attackers full management of their accounts. Attackers push these hyperlinks utilizing templates of faux safety alerts, WhatsApp Internet lookalike portals, and spoofed group-invite messages. These websites are additional optimized for international attain, that includes multilingual help and a country-code selector that adapts the interface for customers throughout a number of areas.
As soon as scammers achieve management of a WhatsApp account, they exploit it to focus on the sufferer’s contacts, typically requesting cash or delicate info underneath the guise of a trusted supply. They could additionally sift by means of messages, media, and paperwork to steal private, monetary, or non-public information, which can be utilized for fraud, impersonation, or extortion. Regularly, these assaults lengthen additional because the compromised account is used to ship phishing messages to the sufferer’s contacts, creating a series of assaults that spreads the rip-off.
HackOnChat demonstrates that social engineering stays some of the scalable assault vectors at present, particularly when attackers exploit trusted and acquainted interfaces and the human belief constructed round them.
Learn the total report right here and discover all of CTM360’s newest insights and menace intelligence.
Study extra at www.ctm360.com

Discovered this text attention-grabbing? This text is a contributed piece from one in all our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Campaign, CTM360, Exposes, Global, HackOnChat, Hijacking, WhatsApp

Post navigation

Previous Post: Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
Next Post: Threat Actors Pioneering a New Operational Model That Combines Digital and Physical Threats

Related Posts

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts The Hacker News
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks The Hacker News
Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments The Hacker News
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark