• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

WhatsApp GhostPairing Scam Lets Hackers Hijack Accounts

Akinola Ajibola by Akinola Ajibola
December 20, 2025
in Security
Share on FacebookShare on Twitter

A cybersecurity company has found a new method for taking over WhatsApp accounts that exploits the app’s legal device-linking feature. Without obtaining passwords, SIM cards, or authentication codes, the GhostPairing campaign enables hackers to fully access a victim’s WhatsApp account. The attack uses social engineering to persuade consumers into authorising a malicious device rather than taking use of software faults. According to reports, the technique is hard to spot, spreads swiftly through reliable contacts, and exposes significant flaws in the way device-pairing features are now created and comprehended by users.

The research from the cybersecurity company Gen Digital claims that the attack starts with a quick message from a reliable acquaintance, usually along the lines of “Hey, I just found your photo!” pickup line, which is sent. The message contains a link that shows up in WhatsApp as a preview similar to Facebook. When visitors click the link, they are taken to a phoney webpage that mimics a Facebook photo viewer and requests that they “verify” before they can access the material.

Facebook is not involved in the verification process at all. Rather, the page subtly initiates the official device-pairing procedure of WhatsApp. After victims provide their phone number, WhatsApp creates a numerical pairing code. The phoney page then gives users instructions to input this code into WhatsApp, giving the impression that it is a standard security check.

Users unintentionally accept the attacker’s browser as a linked device when they type the code, according to the research. This grants attackers complete access to WhatsApp Web, enabling them to read conversations, download media, send messages as the victim, and receive new messages instantly. It is challenging to detect the hack because the phone keeps operating normally.

Although the campaign was initially seen in Czechia, Gen Digital cautioned that it might quickly expand to other areas. Instead of using mass spam to spread the attack, compromised accounts are utilised to transmit the same enticement to contacts and group chats.

The technique does not take advantage of software vulnerabilities or get around encryption, according to the report’s researchers. Rather, it depends on legitimate features functioning as intended and social engineering. This makes the attack especially worrisome, according to the research, since linked devices stay active until users actively deactivate them.

Users are encouraged to often check WhatsApp’s Settings > Linked Devices section and delete any strange sessions in order to be safe. Additionally, the researchers suggested turning on two-step verification, treating any request to scan QR codes or input pairing numbers from websites as suspicious, and taking the time to confirm odd messages, even from contacts you know.

Also Whatsapp users should never share codes, never scan QR codes from outside websites or enter pairing codes. Whatsapp users should always be the only one to start the WhatsApp device connecting process.

Another advise to users, is to activate 2FA, (Two Factor Authentication or Multi-Factor Authentication), in which the setting is in your WhatsApp settings, by enabling the Two-Step Verification. This offers a crucial layer of overall protection, even though it doesn’t prevent this particular vulnerability once a device is connected.

Also users should check unexpected links, before clicking on a strange link sent by a friend, give them a call to make sure.

According to reports, GhostPairing is drawing attention to more general dangers in device-pairing technologies that are utilised by numerous apps. Convenience is an important benefit, but the report suggested that greater controls, more context for pairing requests, and more explicit cautions might help lessen abuse.

Why it is dangerous, with the authentication bypass, the link seems authentic to WhatsApp’s systems because the user directly authorises it, and this circumvents the conventional security. Also stealthy persistence by the “ghost device” which might stay linked in the background for months while the victim’s phone keeps operating normally. The quick spread is a cycle that is continued by the attackers using the compromised account to message the victim’s friends, family, and co-workers.

Related Posts:

  • skynews-instagram-meta-facebook_6688367
    WhatsApp iOS Users May Soon Link Instagram Profiles
  • Picture2
    Soon, WhatsApp Will Simplify the Process of Adding…
  • WA_NEW_MULTIPLE_ACCOUNTS_FEATURE_SETTINGS_IOS
    WhatsApp Plans to Introduce Multiple Accounts Feature on iOS
  • English_WhatsApp_passkey-encrypted-backups-1
    WhatsApp Adds Passkey Protection for Encrypted Backups
  • WA_STRICT_SECURITY_ACCOUNT_SETTINGS_FEATURE_ANDROID
    WhatsApp Tests ‘Strict Account Settings’ for Better Security
  • WA_ADD_FACEBOOK_PROFILE_LINKS_FEATURE_ANDROID
    WhatsApp Beta Adds Option to Link Facebook Profile
  • skynews-russia-hacker_5812455
    Russian Hackers Target WhatsApp for Data on Ukraine
  • blog-a-lurking-npm-package
    Malicious npm Package Compromises WhatsApp Accounts

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: securitywhatsappwhatsapp ghostpairing
Akinola Ajibola

Akinola Ajibola

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • OpenClaw Creator Peter Steinberger Joins OpenAI February 16, 2026
  • Google Pixel to Get Dedicated Now Playing App on Play Store February 16, 2026
  • Threads Introduces AI ‘Dear Algo’ Feed Feature February 16, 2026
  • Tesla’s Apple CarPlay Support Delayed Over iOS 26 Issues February 15, 2026
  • Kenya Tightens Nil Tax Returns as Nigeria Targets Failed Airtime and Data Debits February 15, 2026
  • Apple: Two-Thirds of iPhones Now Run iOS 26 February 14, 2026
  • Meta Turns Threads ‘Dear Algo’ Complaints Into Feature February 13, 2026
  • OpenAI’s Codex-Spark Runs on Cerebras Wafer-Scale Chip February 13, 2026
  • MiniMax Unveils M2.5 Models to Cut Frontier AI Costs February 12, 2026
  • Instagram Develops AI Face Swap to Rival OpenAI’s Sora February 12, 2026
  • Google Maps Adds Gemini With Interactive Place Discussions February 12, 2026
  • Apple and Google Pledge Measures to Improve App Store Fairness February 12, 2026

Browse Archives

February 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
232425262728 
« Jan    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.