WhatsApp scam alert : GhostPairing attack steals accounts via fake links

A sophisticated phishing campaign targeting WhatsApp users has emerged, exploiting the platform’s legitimate device-linking feature to gain unauthorized access to accounts. Security researchers at Gen Digital, the parent company behind Norton, Avast and AVG antivirus solutions, have identified this malicious operation dubbed GhostPairing. The attack leverages social engineering tactics combined with technical manipulation to compromise victim accounts through seemingly innocent messages from trusted contacts.

The attack mechanism begins when victims receive a message from someone in their contact list. However, this contact’s account has already been compromised by cybercriminals. The message typically claims to have discovered a photograph of the recipient online, accompanied by a link to view the supposed image. This initial approach capitalizes on human curiosity and the trust people place in their existing connections.

TechnologyThey tear down BYD’s new hybrid engine and discover a technology already known at Porsche

The fraudulent link displays a preview that mimics a genuine Facebook page, adding an extra layer of authenticity to the scam. When users click through, they encounter what appears to be Facebook’s interface, though it’s actually a carefully crafted replica. The fake site prompts visitors to “verify” their account before accessing the mentioned photograph. At this critical juncture, the system requests the user’s phone number to send a verification code.

Once the phone number is submitted, attackers initiate a genuine WhatsApp connection request behind the scenes. The messaging platform then sends an authentic verification code to the victim’s smartphone. The fraudulent website subsequently asks users to enter this code, supposedly to complete the login process. If victims comply and input the code, hackers intercept this information and use it to finalize the device pairing with the target’s WhatsApp account.

After successfully linking their device to the victim’s account, cybercriminals gain extensive access to all private conversations and contact information. They can read historical messages, view shared media files, and monitor ongoing communications in real-time. More alarmingly, attackers can send messages impersonating the legitimate account owner, enabling them to propagate the scam further across the victim’s network of contacts.

TechnologySay goodbye to old screen protectors, this new invention is taking off and protects your smartphone far better

This propagation mechanism creates a cascade effect, as each newly compromised account becomes a vector for spreading the attack to additional victims. The messages appear to originate from trusted sources within established social circles, significantly increasing the likelihood that recipients will click the malicious links. Cybercriminals exploit this chain of trust to harvest sensitive personal information, financial details, and potentially compromise business communications.

The GhostPairing attack demonstrates enduring effectiveness despite not being fundamentally new. Its success relies heavily on psychological manipulation and social engineering principles rather than sophisticated technical exploits. Victims receive messages from familiar contacts, naturally assuming that friends or family members would never knowingly send harmful links. This cognitive bias significantly lowers defensive barriers.

The attack exploits WhatsApp’s legitimate functionality for linking multiple devices to a single account, adapting standard phishing techniques to the platform’s specific architecture. Criminals insert an interception phase that captures verification codes through counterfeit pages, seamlessly integrating this step into what appears to be a normal authentication process. The scenario contains logical inconsistencies that should raise red flags. For instance :

  • Legitimate Facebook content doesn’t require WhatsApp verification codes
  • Viewing photographs shouldn’t necessitate account authentication
  • Trusted contacts rarely share unsolicited links without prior conversation
  • URL structures on fraudulent sites often contain suspicious elements

However, attackers count on victims’ inattention and the sense of urgency created by the prospect of seeing a photo of themselves online. This emotional trigger overrides rational scrutiny of the request’s legitimacy.

TechnologyThis study is clear: you need to change your password immediately if it appears on this list

Vigilance remains the most effective defense against this type of cyber threat. When receiving suspicious messages, even from known contacts, users should resist the impulse to click links immediately. Instead, attempt to reach the supposed sender through alternative communication channels such as voice calls or different messaging applications. This verification step can quickly confirm whether the message is genuine or if the contact’s account has been compromised.

For casual acquaintances or contacts with whom you rarely communicate, ignoring suspicious messages represents the safest approach. Never enter verification codes on websites accessed through third-party links, particularly when URLs appear unusual or unfamiliar. Legitimate services never request authentication codes via external links sent by other users.

If you suspect your WhatsApp account may have been compromised, immediately check connected devices through the application settings. The platform provides a section displaying all devices currently linked to your account. Review this list carefully and revoke access for any unrecognized devices. Additionally, enable two-step verification within WhatsApp’s security settings, adding an extra layer of protection that requires a personal PIN for account registration on new devices.

TechnologyWaymo robotaxis freeze during San Francisco power outage

Regular security awareness and cautious online behavior form the foundation of protection against evolving phishing campaigns. Stay informed about emerging threats, verify unexpected requests through independent channels, and maintain skepticism when messages create artificial urgency or appeal to emotional triggers like curiosity or vanity.

Spread the word with a share!

Leave a review