WhatsApp device linking abused in account hijacking attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的文章是关于GhostPairing攻击的,看起来挺复杂的。首先,我得通读整篇文章,抓住关键点。 文章提到威胁分子利用WhatsApp的设备配对功能,通过欺骗用户输入配对码来劫持账户。攻击过程不需要认证,用户被诱骗链接攻击者的浏览器到自己的WhatsApp设备。这样攻击者就能获取完整的聊天记录和媒体,甚至冒充用户进行诈骗。 接着,文章解释了攻击是如何进行的:受害者收到一条看似来自熟人的消息,链接声称是在线照片。链接实际上是假的Facebook页面,诱导用户提供手机信息,进而生成配对码。一旦输入配对码,攻击者就完全控制了账户。 此外,Gen Digital指出这种攻击最初在捷克被发现,但传播机制允许其扩散到其他地区。受害者通常不知道设备被链接了,所以很难察觉。 最后,文章建议用户检查已链接的设备、启用双重认证,并警惕可疑消息。 现在我需要把这些信息浓缩到100字以内。重点包括:攻击方式(利用配对功能)、如何实施(诱骗输入配对码)、后果(获取聊天记录、冒充诈骗)、以及防范措施(检查设备、启用双重认证)。 可能的结构:威胁分子利用WhatsApp的设备配对功能,通过诱骗用户输入配对码劫持账户。攻击无需认证,导致信息泄露和冒充风险。建议检查已链接设备并启用双重认证以防范。 检查字数是否在限制内,并确保信息准确全面。 </think> 威胁分子利用WhatsApp的设备配对功能劫持账户。通过诱骗用户输入配对码或扫描二维码,攻击者无需认证即可获取完整聊天记录和媒体,并可能冒充用户进行诈骗。建议检查已链接设备并启用双重认证以防范此类攻击。 2025-12-17 19:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

WhatsApp device linking abused in account hijacking attacks ?

Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.

This type of attack does not require any authentication, as the victim is tricked into linking the attacker’s browser to a WhatsApp device.

By doing so, threat actors gain access to the full conversation history and shared media, and may leverage information to impersonate users or commit fraud.

Wiz

Gen Digital (formerly Symantec Corporation and NortonLifeLock) says that the campaign was first spotted in Czechia but warns that the propagation mechanism allows it to spread to other regions, with compromised accounts acting as springboards to reach new targets.

How GhostPairing works

The attack starts with a short message from a known contact, sharing a link allegedly leading to an online photo of the victim. To instill some trust, the link is displayed as a content preview from Facebook.

Malicious message sent to the target
Malicious message sent to the target
Source: Gen Digital

Furthermore, the link takes the victim to a fake Facebook page hosted on typosquatted or similar-looking domains, which informs that users need to be verified by logging in before accessing the content.

The verification page is deceptive and actually triggers WhatsApp’s device-pairing workflow. Victims are asked for their phone number, which the attacker uses to initiate a legitimate device-linking or login process.

The fake Facebook site
The fake Facebook site
Source: Gen Digital

WhatsApp generates a pairing code that the attacker displays on the fake page. WhatsApp also prompts the victim to enter the code to link the new device to their account.

While WhatsApp's message is clear that the notification is for an attempt to link a new device to the account, users are likely to miss it.

Once the victim enters the pairing code, the attacker has complete access to the account without needing to bypass any protections.

WhatsApp Web provides access to new messages in real time and allows viewing or downloading shared media. It can be used to send messages and forward the same lure to available contacts and groups.

“Many victims are unaware that a second device has been added in the background, which is what makes the scam even more dangerous – criminals are hiding in your account, watching your every conversation without you even knowing it,” Gen Digital warns.

The only way to uncover the compromise is to go to Settings → Linked Devices, and check for unauthorized devices linked to the account.

Users are encouraged to block and report suspicious messages and activate two-factor authentication account protection. If you are rushed into taking action, you should always take your time, analyze the received message, if it makes sense, and if the person contacting you is indeed who they claim.

It should be noted that linking devices is also possible by scanning a QR code using the mobile WhatsApp application.

The feature is available in multiple messaging apps and has been exploited by Russian threat actors in the past to gain access to Signal accounts of interest.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/whatsapp-device-linking-abused-in-account-hijacking-attacks/
如有侵权请联系:admin#unsafe.sh