Introduction:
1、WhatsApp Hacks on the Rise: How Scammers Are Gaining Access and How You Can Protect Yourself

2、Explainer: How WhatsApp was hacked to spy on Indian activists and lawyers and who could’ve done it
WhatsApp Hacks on the Rise: How Scammers Are Gaining Access and How You Can Protect Yourself ♂
WhatsApp, the messaging app with nearly 4 billion users worldwide, has become a trusted part of our daily lives. It’s the platform we turn to for quick messages, updates, and even business communications. WhatsApp’s end-to-end encryption assures us that our messages are safe and secure, read only by the sender and receiver. Yet, despite these security measures, a disturbing wave of WhatsApp hacking cases has recently emerged in India, causing concern among users who wonder if their private messages are truly secure.
So, how are scammers bypassing WhatsApp’s advanced security features? And, most importantly, what can you do to protect yourself?
The rising reports of WhatsApp hacks are alarming. High-profile cases, like that of Supriya Sule, an Indian politician whose account was compromised by fraudsters who used her name to demand money, underscore the severity of the issue. More recently, Kerala IAS officer K. Gopalakrishnan reported that hackers breached his account, creating a controversial group in his name. These incidents not only violate privacy but also reveal how hackers can exploit WhatsApp’s popularity to defraud and deceive unsuspecting users.
Meta, the parent company behind WhatsApp, maintains that its encryption safeguards users’ conversations, claiming no one—not even the company—can access the contents of messages, photos, or documents. However, hackers have found ways around these protections, often capitalizing on common user mistakes rather than flaws in the platform itself.
With so many safeguards in place, how are hackers infiltrating accounts? While WhatsApp’s security is robust, certain user actions can inadvertently open the door for scammers. Here’s how these hacks often happen—and how you can protect yourself:
1. Two-Step Verification: A Layer of Protection You Shouldn’t Miss
If you haven’t activated two-step verification, you’re leaving your WhatsApp account exposed. This security feature requires you to set a unique PIN that only you know. When enabled, WhatsApp occasionally prompts you for this PIN to verify your identity.
However, if you share this PIN, even accidentally, you risk losing access to your account. Hackers may pose as trusted contacts to trick you into sharing it, so treat your PIN like the key to your safe—it should never be shared. Enabling two-step verification adds a critical barrier against unauthorized access and can be activated through WhatsApp’s settings under “Account Security.”
2. Unknown Links: The Danger Lurking in Clicks
In today’s digital landscape, clicking unknown links has become a fast track to getting hacked. Scammers frequently send deceptive messages with malicious links that, once clicked, install malware on your device, granting hackers access to your WhatsApp and even your phone. These scams can be particularly sophisticated, disguising malware links as messages from known contacts or reputable companies.
A good rule of thumb? If you’re even slightly unsure about a link, don’t click it. Take the time to verify the source, and when in doubt, delete the message. A single careless click could hand over control of your data, conversations, and contacts to cybercriminals.
3. Public WiFi: A Risky Gateway for Hackers
While convenient, public WiFi networks are also prime targets for hackers seeking access to unencrypted data. WiFi networks at airports, hotels, and cafes are often unprotected, making it easy for scammers to intercept your data, including your WhatsApp information.
If you must use public WiFi, a Virtual Private Network (VPN) can offer a safer browsing experience by encrypting your internet connection. However, the safest option is to avoid public WiFi altogether, especially for sensitive communications or financial transactions on WhatsApp.
4. Verification Code Scams: The Number Trap
If someone attempts to register WhatsApp using your number, you’ll receive a verification code to protect your account. Scammers often pose as tech support agents or even friends, asking you to share this code under false pretenses. This code is the last line of defense for your account. If you receive a call, text, or message asking for it, never share it.
Receiving an unexpected verification code notification is a red flag that someone may be trying to hijack your account. Ignoring or deleting the message is your best course of action, as sharing this code could lead to losing control over your account.
With hacking on the rise, taking a few proactive steps can make a significant difference in safeguarding your WhatsApp account:
Enable Two-Step Verification: This adds an extra layer of security that could stop hackers in their tracks.
Avoid Clicking on Unknown Links: Don’t let curiosity get the best of you. Unfamiliar links are often traps.
Steer Clear of Public WiFi: When possible, use your mobile data or a secure, private WiFi connection.
Guard Your Verification Code: Remember, this code is strictly for your use—no one else should have access to it.
As WhatsApp continues to be a vital tool for communication, vigilance is more crucial than ever. In today’s world, our digital lives carry enormous value, and it’s up to each of us to protect our personal information. By understanding the tactics that scammers use and implementing these preventive measures, you can significantly reduce your chances of becoming a victim.
Explainer: How WhatsApp was hacked to spy on Indian activists and lawyers and who could’ve done it ♂
On Thursday, as many as 17 Indian cases of activists, lawyers and scholars being spied on by a sophisticated Israeli software program emerged. They had been targeted using the popular WhatsApp messaging platform, with the app compromised to deliver a state-of-the-art spying software called Pegasus.
How was this done, what does it mean for Indian politics and who did it? This explainer breaks down this story that could change how Indians view their phones.
In August 25, 2016 Ahmed Mansoor, a human rights activist from the United Arab Emirates, from a number he did not recognise on his smartphone.
Mansoor flagged the message to Citizen Lab, a Canadian digital rights watchdog. This chance event led to the discovery of one of the most powerful snooping software currently in existence.
Called Pegasus, the program downloads itself onto a phone using either a malicious URL or a redirected website. Since May, however, it has emerged that Pegasus can also into a phone via only missed calls on the messaging app WhatsApp. This means that a user who has WhatsApp installed has no way to prevent their device from being compromised should she become a target.
Pegasus is owned by an Israeli firm called NSO, which is currently being sued in the United States by . In a statement, NSO has argued that it is not to blame since it only sells Pegasus to “government intelligence and law enforcement agencies to help them fight terrorism and serious crime” rather than “for use against human rights activists and journalists”.
What can’t it do would be an easier question to answer. Once on a phone, the spyware has the run of the place. It can intercept every call and SMS, read every email and monitor each messaging app. Pegasus can also control the phone’s camera and microphone and has access to the device’s location data. The app advertises that it can carry out “file retrieval”, which means it could access any document that a target might have stored on their phone.The type of data Pegasus can access as per leaked marketing materials
When Pegasus was discovered in 2016, its capabilities were so advanced, security experts couldn’t help but marvel at it, even as they feared what it could be used for. Talking to American website, Vice, mobile security expert called it “one of the most sophisticated pieces of cyberespionage software we’ve ever seen”. The software is so powerful that the Israeli government classifies it as a weapon.
Mansoor’s curiosity was simply dumb luck that led to the spyware getting discovered. There’s a good chance most Pegasus attacks will never be detected. In one interview to Defence News, as quoted in the BBC, the secretive NSO Group’s co-founder, Omri Lavie, said their attacks would “leave no trace”.
Pegasus has been used across the world against dissidents, human rights activists and journalists. WhatsApp has found that 1,400 people around the world fell victim to Pegasus using just one of its delivery methods: missed WhatsApp calls. Of those, 100 are members of “civil society” as per WhatsApp’s statement, calling it an “unmistakable pattern of abuse”.
A investigation has found that dissidents in Rwanda had been spied upon, including a journalist in exile, a human rights activist a senior opposition party member in exile and a former army officer who testified against the government in a French court. The Financial Times report went on to say that this was part of a pattern in how Paul Kagame, the Rawandan president for the past two decades ran the country.
Much the same pattern was found in India, with the target being activists, lawyers and scholars who are critical of the Bharatiya Janata Party government. In many cases, Scroll.in found that the targets were connected to a commemoration of Dalit history that preceded violence between Dalits and Marathas at Bhima Koregaon in Maharashtra on January 1, 2018.
The government is prosecuting the organisers of the event claiming that they were connected to banned far-left groups – but has yet to produce evidence to back its claims.
No, that won’t entirely help.
The glitch that allowed Pegasus to worm its way into a phone using a WhatsApp missed call has been patched up. But in the event that Pegasus had already been installed on to a phone before that, not only WhatsApp, every app and function on the device is compromised. The only way to fix it it to replace the handset itself.
Moreover, this is just one delivery method that has been detected. There are several , not just in WhatsApp, but also Telegram, another encrypted messaging service.
WhatsApp was probably selected by Pegasus to enter phones because it is widely popular, used by nearly a fourth of the planet. There is no guarantee other apps are not currently compromised or will not be in the future.
Given that NSO claims it only sells to governments and the fact that it is mostly critics of the ruling dispensation who have been targeted, some people have alleged that it is the Indian government that was behind the snooping.
Related questions
Attempting to hire a hacker, even for free, is illegal and unethical under India's Information Technology Act (2000), which criminalizes unauthorized access to computer systems, data breaches, and cybercrimes. Engaging in such activities can lead to severe penalties, including fines and imprisonment. Here’s a breakdown of key considerations and alternatives:
Risks of Seeking "Free Hackers":
- Legal Consequences: Participating in or soliciting hacking services violates Indian law, regardless of payment.
- Scams: Many claiming to offer "free hacking" are fraudsters aiming to steal money, personal data, or install malware.
- Ethical Concerns: Unauthorized hacking breaches privacy and trust, harming individuals and organizations.
Legitimate Alternatives:
- Cybersecurity Professionals: Contact certified ethical hackers or firms (e.g., through platforms like HackerOne or Bugcrowd) for authorized penetration testing or recovery help. Note that these services are typically paid.
- Report Issues to Authorities:
- CERT-In (Indian Computer Emergency Response Team): Report cybercrimes at cert-in.org.in.
- Cyber Crime Cells: File complaints via the National Cyber Crime Reporting Portal (cybercrime.gov.in).
- Platform Support: For account recovery (e.g., social media, email), use official support channels (e.g., "Forgot Password" or customer service).
Protect Yourself:
- Avoid sharing personal details with strangers online.
- Use strong passwords and two-factor authentication (2FA).
- Educate yourself on phishing and scams.
Final Note:
If you’re facing a security issue, always pursue legal and ethical solutions. Hacking is not a safe or viable option. Prioritize your safety and compliance with the law.

评论已关闭