This is how they can steal WhatsApp from us: why they want it and how to protect themselves | Your Technology | The country

“Hello, dad, I have lost my cell phone and I am writing to you from this new number. Can you send me money? I’m in a hurry”. This is how the well-known scam of the son in trouble begins, which continues to circulate on mobile phones in Spain and, beyond money, one of the loot that the attackers are after is the owner’s WhatsApp account. The messaging app most popular in the world remains the main target of cyber attacks, reaching almost 90% of the total, according to a study published by the computer security company Kaspersky.

Why WhatsApp? “If you get a WhatsApp account, you have credible access to the entire spectrum of friends, family and co-workers,” explains Fernando Suárez, president of the General Council of Computer Engineering Colleges, and this credibility can trigger a request for money, personal data “or even photos, which are then used to extort the victim.”

The son in distress scam, on many occasions, is used to request a delivery of money through Bizum, PayPal or even a bank transfer. This technique takes advantage of the vulnerability of a parent who takes for granted a presumed emergency situation of their child and proceeds to pay without hesitation. Although this technique is initially used from a third-party line, it becomes more truthful and credible if the message comes from the sender’s own WhatsApp account.

And the thing is that, once they have control of the account, the attackers can write from it to the victim’s contacts openly requesting money, as in the aforementioned scam, or more personal information that can then be used to extort the account holder. The sophistication of the attackers reaches even the use of voice synthesizers to emulate the tone of the owner in order to send audios: “Cybercriminals use the compromised account to request money transfers from the victim’s contacts, even using artificial intelligence technologies to imitate the victim’s voice,” reports Kaspersky.

In the same way, whoever has control of the account has access to graphic material and videos, both received and sent, which can then be used as coercion to request money.

What is the attack on the account like?

The first thing to be clear about is that WhatsApp, like the rest of the messaging platforms, has a two-factor verification system. That is, you need to have a temporary code (known as token), which is sent to the mobile phone registered in the account to access it. This is experienced by those who buy new terminals, when they try to configure WhatsApp on the newly purchased mobile phone. A cyber attacker may know the victim’s phone number — the numbers are available on the dark web or dedicated forums, due to leaks and vulnerabilities—but it lacks the aforementioned token to be able to take control of the account.

Therefore, when the attack is carried out, the victim will first receive an official WhatsApp SMS with the aforementioned temporary code, and this is where everything happens very quickly. Immediately, the hackers will contact the victim posing as a friend or family member, indicating that, by mistake, they entered their phone number and need that received code. If the victim tells you this, along with the additional security code, you will have lost control of the account and the attack will have been completed.

What to do to protect the account

As usually happens in other attacks that use phishing, hackers use the human factor, which is the weakest link in the entire protection chain. To reinforce it, experts recommend adopting the following measures:

  • Distrust requests by message. “It is important to remain alert and distrust any message that requests personal information or click on links, even if it appears to come from a known contact,” recommends the Russian multinational Kaspersky. The attacks are increasingly sophisticated and it is easy to let our guard down when we believe that it is a family member or friend who is writing to us. Suárez refers to this same thing, who speaks of a “previous will of the victim” to warn that “no one receives a code on their mobile phone if they have not requested it before.” Likewise, you should never click on a link if you are not 100% sure of its origin.
  • Contact the sender by another means. Cyber ​​attackers often try to trick their victims by posing as family or friends; If this happens, a good solution is to contact them by another means – a phone call may be enough – to verify if this communication is real or not.
  • Activate two-step verification. WhatsApp includes an extensive list of safety recommendations to protect the account as much as possible. Among them, it is essential to make sure you have two-step verification activated (within the app itself, in Settings > Account > Two-Step Verification). When activated, the platform asks to create a six-digit PIN and, in case the user forgets it, gives the option to add an email account to recover it.
  • Use anti-malware and have the device updated. The use of antivirus on mobile phones has always been cause of controversy, especially on the iPhone, but it represents an additional layer of security to detect the malware: works by analyzing and detecting links that may arrive through WhatsApp. Keeping both the WhatsApp app and the phone’s operating system updated also ensures that the latest vulnerabilities are addressed.

You can follow The USA Print in Facebook and x or sign up here to receive our weekly newsletter.

Our Free Online Tools

Instagram Hashtags Twitter Trends Youtube Trends Google Trends Amazon Trending Products Age Calculator EMI Calculator Love Calculator Percentage Calculator Margin Calculator

Latest Articles

Popular Article Categories

Related Articles

Why it is so dangerous for artificial intelligence to learn to...

A poker player has bad cards but makes the biggest bet. The rest of the players are scared by...
Read more
“Abusing the clean look (I will surely go bald)”, says a user on network. It refers to the trendy...
“The question is 'give me a typical recipe from Peru', and then I'll give it to you,” says María Grandury,...
Someone at Apple thought it was a good idea, to celebrate creativity, to have an ad showing a huge hydraulic...
A 100% functional quantum computer is not yet available, although it is getting closer. However, the potential of computing...
Demis Hassabis, the London-raised son of a Greek Cypriot and a Singaporean, is a chess prodigy. He started playing...

LEAVE A REPLY

Please enter your comment!
Please enter your name here

x