In an increasingly digitized world, online security threats continue to grow. A domain that draws particular attention is that of messaging apps, which have become an integral part of our daily lives. Recently, a new threat has been identified for users of any of these popular apps, WhatsApp. According to Zuk Avraham, a cybersecurity researcher and specialist in mobile systemsit would be possible to hack into a WhatsApp account while the user is sleeping.
An alarming new hacking technique
The method is based on a voicemail attack. Many smartphone users tend to turn off their device or turn on airplane mode before sleeping. This cuts off phone calls, which are then redirected to voicemail.
A hacker could then dial the user’s phone number, which normally sends a verification SMS. However, as the phone is offline, this message remains pending. The hacker can then attempt to log in again using WhatsApp’s call verification.
The automatic service of WhatsApp calls the user’s number and leave a message with a verification code on the answering machine. The hacker can then access this message using remote messaging. It should be noted that most telephone operators offer a service allowing these messages to be viewed remotely.
The pirate only needs the phone number and a secret code to access email. This code is often a four-digit number, sometimes composed by default of the last four digits of the telephone number.
How to protect yourself?
Once the account is hacked, the recovery process may take several days. During this time, the hacker might attempt to scam the user’s contacts or spread malware through WhatsApp conversations. To guard against this type of attack, Zuk Avraham recommends changing the voicemail code and setting up additional authentication in WhatsApp, especially by email.
What to remember about this new form of piracy
This new hacking technique highlights the importance of online security vigilance. WhatsApp users should be aware of the potential risks and take the necessary steps to secure their accounts. This includes changing voicemail codes regularly and enabling additional authentication. Ultimately, online security requires constant attention and awareness of new threats which may occur. It is always best to be prepared and take the necessary steps to protect yourself.