Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CVE volumes may plausibly reach 100,000 this year

    London Assembly member: Police should halt facial-recognition technology use

    Peer ‘disappointed’ that DWP review of subpostmaster prosecutions is still months away

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Berachain Jumps 150% as Strategic Pivot Lifts BERA

      February 12, 2026

      Tom Lee’s BitMine (BMNR) Stock Faces Cost-Basis Risk — Price Breakdown at 10%?

      February 12, 2026

      Why the US Jobs Data Makes a Worrying Case for Bitcoin

      February 12, 2026

      MYX Falls Below $5 as Short Sellers Take Control — 42% Decline Risk Emerges

      February 12, 2026

      Solana Pins Its $75 Support on Short-Term Buyers — Can Price Survive This Risky Setup?

      February 12, 2026
    • Technology

      CVE volumes may plausibly reach 100,000 this year

      February 12, 2026

      London Assembly member: Police should halt facial-recognition technology use

      February 12, 2026

      Peer ‘disappointed’ that DWP review of subpostmaster prosecutions is still months away

      February 12, 2026

      The Security Interviews: Mick Baccio, Splunk

      February 12, 2026

      UK government datacentre planning decisions queried over environmental oversight admission

      February 12, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Hackers can take over your WhatsApp account with this sneaky trick
    Technology

    Hackers can take over your WhatsApp account with this sneaky trick

    TechAiVerseBy TechAiVerseDecember 20, 2025No Comments4 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers can take over your WhatsApp account with this sneaky trick
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Hackers can take over your WhatsApp account with this sneaky trick

    You can often summarize cybersecurity as “same stuff, different day.” Attacks change, but rarely so dramatically you can’t see familiar methodology underneath. The latest example: Bad actors exploiting WhatsApp’s device linking process to infiltrate unsuspecting users’ accounts.

    As detailed by antivirus software maker Gen Digital, parent company for Norton, Avast, and AVG, this “GhostPairing” campaign relies on duping unsuspecting users into helping hackers login to their WhatsApp account (h/t BleepingComputer). It’s a variation on a phishing attack, and works like this:

    1. You receive a WhatsApp message from one of your known contacts.
    2. They tell you they’ve found a photo of you online, and include a link.
    3. The link preview supposedly shows a Facebook page, but is actually a faked site.
    4. When you click on the link, you’re asked to verify your account to see the photo.
    5. The fake site then asks for your phone number.
    6. Once received, the attacker begins the login process from their side. A real verification code will be sent to your phone.
    7. The fake site then asks for this login code.
    8. If you input the code, that information is captured and then used to complete the device linking process.

    Victims that fall prey to this attack will believe they’re verifying the account for Meta’s purposes, but in actuality, they’re going through a legitimate login process.

    Once hacker has access to your account, they can see all of your existing messages and any new incoming messages. They can also send messages on your behalf to contacts to further the cycle of snooping on others for sensitive data.

    An example of the fake Facebook login verification screen, taken by Gen Digital.

    Gen Digital

    Fortunately, this type of attack isn’t new, which means you can more easily recognize it. First, it relies on unquestioning faith in your contacts—that you trust they would only ever send you uncompromised links.

    Second, it follows a similar pattern as more typical phishing attempts. You click on a fraudulent link, then input necessary login information on a fake (but convincingly real) site. Those credentials get captured and used by the attacker. The main difference here is that instead of recording your password (which can then be used for later credential stuffing attacks) and stealing two-factor authentication codes, this malicious campaign adapts to WhatsApp’s login method.

    Third, it tells on itself through odd behavior. In a normal scenario, you would not verify your access to Facebook content with your WhatsApp login details. The attacker is hoping you’re not paying too close attention to what’s happening!

    To avoid getting tripped up by this dirty trick, be mistrusting. Don’t interact with the link. Instead, if it’s someone you know, contact them through a different method, like a phone call or different messaging app, and ask what’s up. (Pun mildly intended.) If you don’t know them well, ignore the message. And in general, don’t share login codes with sites until you’ve verified the site is actually official.

    If you’re worried that someone might have access to your WhatsApp account, you can check to see what phones, tablets, and/or PCs are connected by heading to Settings > Linked Devices. You can also perform a similar check for many major services, like Google, Apple, Microsoft, Facebook, and more. I always recommend taking a peek every so often, just to make sure you’re locked down and safe.


    Author: Alaina Yee
    , Senior Editor, PCWorld

    A 14-year veteran of technology and video games journalism, Alaina Yee covers a variety of topics for PCWorld. Since joining the team in 2016, she’s written about CPUs, Windows, PC building, Chrome, Raspberry Pi, and much more—while also serving as PCWorld’s resident bargain hunter (#slickdeals). Currently her focus is on security, helping people understand how best to protect themselves online. Her work has previously appeared in PC Gamer, IGN, Maximum PC, and Official Xbox Magazine.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleGE Cync Keypad Dimmer Smart Switch review: For Cync-heads only
    Next Article Upgrading to a new PC? This 3-in-1 software bundle makes the switch easy
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    CVE volumes may plausibly reach 100,000 this year

    February 12, 2026

    London Assembly member: Police should halt facial-recognition technology use

    February 12, 2026

    Peer ‘disappointed’ that DWP review of subpostmaster prosecutions is still months away

    February 12, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025667 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025253 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025152 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 12, 2026

    CVE volumes may plausibly reach 100,000 this year

    CVE volumes may plausibly reach 100,000 this year The number of vulnerabilities to be disclosed…

    London Assembly member: Police should halt facial-recognition technology use

    Peer ‘disappointed’ that DWP review of subpostmaster prosecutions is still months away

    The Security Interviews: Mick Baccio, Splunk

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    CVE volumes may plausibly reach 100,000 this year

    February 12, 20262 Views

    London Assembly member: Police should halt facial-recognition technology use

    February 12, 20262 Views

    Peer ‘disappointed’ that DWP review of subpostmaster prosecutions is still months away

    February 12, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.