Today : Dec 25, 2025
Technology
24 December 2025

WhatsApp Users Hit By Major GhostPairing Hack

Cybersecurity experts warn of a new zero-day attack that exploits WhatsApp’s device-linking feature, allowing hackers to hijack accounts and access private messages without users’ knowledge.

On December 24, 2025, the cybersecurity world was shaken by the discovery of a sophisticated new cyberattack targeting WhatsApp users across the globe. The attack, which exploits a previously unknown vulnerability in the messaging app, was identified and reported by the renowned cybersecurity company Avast. Their findings, published in outlets such as Independent, have set off alarm bells for both everyday users and digital security professionals alike.

The attack, ominously dubbed "GhostPairing," represents a new breed of cybercrime—one that leverages not just technical flaws, but also the trust and habits of everyday people. Unlike traditional hacks that rely on breaking through encryption or brute-forcing passwords, GhostPairing takes a subtler, more insidious route. It exploits legitimate features within WhatsApp itself, tricking users into unwittingly granting hackers full access to their private conversations, photos, videos, and even voice notes.

The mechanics of the attack are both clever and unsettling. According to Avast, it all begins with a seemingly innocuous message sent to the target. This message, crafted to look as if it comes from a trusted contact, contains a link that claims to display a personal photo. When the recipient clicks the link, they are redirected to a fake Facebook login page, which asks for their phone number under the guise of verifying their identity. But instead of displaying a photo, the bogus page triggers WhatsApp's device-linking feature, presenting a code that the user is instructed to enter into their app.

What happens next is where the real danger lies. By entering the code, the user unknowingly authorizes a new device—controlled by the attacker—to access their WhatsApp account. As reported by Independent, this grants the hacker immediate and unrestricted access to all the victim's messages, media files, and contacts, without the need for a password or any further authentication. The attacker can then send messages to the victim's contacts, spreading the attack further in a snowball effect that Avast describes as a "snowball effect" or "Tathir Kora Althalj" in Arabic—a reference to how quickly and widely the scam can proliferate.

Avast's security evangelist, Luis Corrons, emphasized the disturbing shift this attack represents in the landscape of cybercrime. "This campaign highlights a growing trend in cybercrime: breaking people’s trust is just as important as breaking their security systems," Corrons told Independent. He went on to explain how scammers are now persuading users to grant access themselves, exploiting familiar mechanisms like QR codes, device-linking notifications, and routine 'verify on your phone' screens. "Scammers convince users to approve access themselves by exploiting familiar mechanisms like QR codes, linking notifications, and 'verify on your phone' screens that seem routine," Corrons added.

What makes GhostPairing particularly alarming is that it doesn’t require any modification of WhatsApp’s code or the user’s device. Instead, it simply takes advantage of the app’s own functionality, weaponizing convenience against its users. Avast’s investigation revealed that the attackers used advanced hacking techniques and multiple infection vectors, including specially crafted messages that, when received, can trigger hidden spyware installations on the victim’s phone. The spyware, once installed, is capable of accessing messages, photos, videos, and audio files—all without the user’s knowledge.

Perhaps most troubling is that users may have already fallen victim to this attack without realizing it. Avast noted in their blog post that some WhatsApp users could have had their accounts compromised without any outward signs. The attackers' ability to move stealthily, leveraging both technical exploits and psychological manipulation, means that the true scale of the breach may not yet be fully understood.

The attack’s reliance on QR code scams and fake verification messages is not unique to WhatsApp. As Corrons pointed out, "This is a wake-up call for any platform that relies on fast device linking without sufficient user explanation." He warned that the automatic trust users place in routine security prompts is now being turned against them, and that "automatic trust has become a tool for exploitation." This sentiment was echoed across the cybersecurity community, which was alerted to the threat on December 24, 2025, as reports of the attack’s spread began to surface.

For those concerned about the safety of their WhatsApp accounts, Avast has provided clear guidance. Users are urged to check their account security by navigating to Settings, selecting Linked Devices, and immediately removing any device they do not recognize. This simple step can help prevent unauthorized access and halt the spread of the attack. As the frequency and sophistication of such manipulative attacks increase, experts stress that security must now account not only for what users intentionally do, but also for what they are tricked into doing.

It’s worth noting that GhostPairing is not the first attack to exploit the trust users place in digital platforms, but its scale and the ease with which it can propagate make it a particularly dangerous development. The fact that it leverages a zero-day vulnerability—a flaw previously unknown and unpatched—means that users and organizations must remain especially vigilant. Avast’s warning that the vulnerability enables remote exploitation without user interaction underscores the urgency of the threat.

The broader implications of this attack extend far beyond WhatsApp. As more platforms adopt quick and seamless device-linking features, the risk of similar exploits grows. The lesson, as Corrons and other experts suggest, is that convenience must never come at the expense of security or transparent communication with users. In a world where cybercriminals are as adept at manipulating psychology as they are at writing code, digital trust has become both a necessity and a liability.

As the dust settles from this latest cyberattack, WhatsApp users—and indeed, anyone who relies on digital communication—are left with a clear message: vigilance and skepticism are now essential tools in the fight against cybercrime. Checking account settings, questioning unexpected messages, and staying informed about emerging threats are no longer optional best practices, but crucial defenses against a new generation of digital deception. The GhostPairing attack may have started as a technical exploit, but its true power lies in its ability to turn our own trust against us.