{"id":26685,"date":"2025-12-21T00:47:54","date_gmt":"2025-12-21T00:47:54","guid":{"rendered":"http:\/\/tezgyan.com\/index.php\/2025\/12\/21\/whatsapp-users-haunted-by-new-horror-story-as-cert-in-warns-of-ghostpairing-risk-tech-news\/"},"modified":"2025-12-21T00:47:54","modified_gmt":"2025-12-21T00:47:54","slug":"whatsapp-users-haunted-by-new-horror-story-as-cert-in-warns-of-ghostpairing-risk-tech-news","status":"publish","type":"post","link":"https:\/\/tezgyan.com\/index.php\/2025\/12\/21\/whatsapp-users-haunted-by-new-horror-story-as-cert-in-warns-of-ghostpairing-risk-tech-news\/","title":{"rendered":"WhatsApp Users Haunted By New Horror Story As CERT-In Warns Of &#8216;GhostPairing&#8217; Risk | Tech News"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div id=\"story-9783479\">\n<p><span class=\"jsx-395e0e0beb19cb6e jsx-3759419209\">Last Updated:<\/span><time class=\"jsx-395e0e0beb19cb6e jsx-3759419209\">December 21, 2025, 05:53 IST<\/time><\/p>\n<h2 id=\"asubttl-9783479\" class=\"jsx-ee90caf6118df965 jsx-3313804306 asubttl-schema\">The exploit allows malicious actors to take &#8216;complete&#8217;\u00a0control of a user&#8217;s WhatsApp account without needing a password, an OTP, or a physical SIM swap<\/h2>\n<div class=\"jsx-ee90caf6118df965 jsx-3313804306\">\n<figure class=\"jsx-ee90caf6118df965 jsx-3313804306 amimg\"><img decoding=\"async\" alt=\"CERT-In has urged all Indian 'Digital Nagriks' to exercise extreme caution when receiving unsolicited links, even from known contacts. Representational image\" title=\"CERT-In has urged all Indian 'Digital Nagriks' to exercise extreme caution when receiving unsolicited links, even from known contacts. Representational image\" src=\"https:\/\/images.news18.com\/ibnlive\/uploads\/2021\/07\/1627283897_news18_logo-1200x800.jpg?impolicy=website&amp;width=400&amp;height=225\" loading=\"eager\" fetchpriority=\"high\" class=\"jsx-ee90caf6118df965 jsx-3313804306\"\/><\/p>\n<p>CERT-In has urged all Indian &#8216;Digital Nagriks&#8217; to exercise extreme caution when receiving unsolicited links, even from known contacts. Representational image<\/p>\n<\/figure>\n<\/div>\n<p id=\"0\" class=\"story_para_0\">India\u2019s premier cybersecurity agency, CERT-In (Indian Computer Emergency Response Team), has issued a high-severity advisory regarding a critical vulnerability in WhatsApp\u2019s device-linking feature. Dubbed \u201cGhostPairing&#8221;, the exploit allows malicious actors to take \u201ccomplete&#8221; control of a user\u2019s <a href=\"https:\/\/www.news18.com\/tech\/whatsapp-users-get-critical-security-alert-from-indian-govt-what-you-should-know-9726941.html\">WhatsApp<\/a> account without needing a password, an OTP, or a physical SIM swap.<\/p>\n<p id=\"1\" class=\"story_para_1\">By leveraging this flaw, attackers can gain real-time access to a victim\u2019s entire chat history, including sensitive photos, videos, voice notes, and live messages on the web version of the platform.<\/p>\n<h4>The Anatomy of the \u2018GhostPairing\u2019 Attack<\/h4>\n<p id=\"2\" class=\"story_para_2\">According to the CERT-In advisory issued on December 19, the attack is primarily a social engineering campaign that abuses legitimate WhatsApp features. The sequence typically begins with a deceptive message sent from a \u201ctrusted&#8221; contact\u2014whose account has likely already been compromised. The message often uses an enticing hook, such as \u201cHi, check this photo of you&#8221;, accompanied by a link that displays a Facebook-style preview to build immediate trust.<\/p>\n<p id=\"3\" class=\"story_para_3\">When a user clicks the link, they are redirected to a fraudulent \u201cverification&#8221; page that mimics the official Facebook or WhatsApp Web interface. Here, the attackers employ two main variants to compromise the account:<\/p>\n<p id=\"4\" class=\"story_para_4\"><strong>The Pairing Code Variant:<\/strong> The fake site prompts the user to enter their phone number. Behind the scenes, the attacker initiates a legitimate \u201cLink with Phone Number&#8221; request on their own browser. WhatsApp then generates an 8-digit pairing code, which the attacker relays back to the fake site. The victim, believing this is a standard security check, enters the code into their WhatsApp app, unknowingly authorising the attacker\u2019s browser as a \u201ctrusted&#8221; device.<\/p>\n<p id=\"5\" class=\"story_para_5\"><strong>The QR Code Variant:<\/strong> In some cases, the phishing site embeds a real-time QR code from the attacker\u2019s WhatsApp Web session. If the victim scans this code from their mobile app to \u201cverify&#8221; their identity, the attacker is instantly logged in.<\/p>\n<h4>Why It Is Highly Dangerous<\/h4>\n<p id=\"6\" class=\"story_para_6\">The \u201cghost&#8221; nature of this pairing is its most lethal characteristic. Because the attack uses the official Linked Devices protocol, it does not trigger a \u201cNew Login&#8221; alert that would typically require a secondary OTP. The victim\u2019s primary phone continues to function normally, with no forced logout, allowing the attacker to remain a silent observer for days or even weeks.<\/p>\n<p id=\"7\" class=\"story_para_7\">During this time, they can monitor all incoming and outgoing communication and even impersonate the user to spread the \u201cGhostPairing&#8221; lure to the victim\u2019s entire contact list and group chats.<\/p>\n<h4>How to Protect Your Account<\/h4>\n<p id=\"8\" class=\"story_para_8\">CERT-In has urged all Indian \u201cDigital Nagriks&#8221; to exercise extreme caution when receiving unsolicited links, even from known contacts. To secure your account:<\/p>\n<p id=\"9\" class=\"story_para_9\"><strong>Audit Your Devices:<\/strong> Go to Settings &gt; Linked Devices in your WhatsApp app. If you see any unfamiliar browser or operating system (e.g., \u201cGoogle Chrome \u2013 macOS&#8221; when you only use Windows), log it out immediately.<\/p>\n<p id=\"10\" class=\"story_para_10\"><strong>Enable Two-Step Verification (2SV):<\/strong> Set up a custom 6-digit PIN in your account settings. This adds a critical layer of protection that a paired device cannot easily bypass.<\/p>\n<p id=\"11\" class=\"story_para_11\"><strong>Never Pair Externally:<\/strong> Never scan a QR code or enter a pairing code on a non-official website. Genuine WhatsApp pairing only ever happens between your phone and an official WhatsApp application or web.whatsapp.com.<\/p>\n<div class=\"jsx-ee90caf6118df965 jsx-3313804306 atbtlink fp\"><span>First Published:<\/span><\/p>\n<div class=\"rs\">\n<p>December 21, 2025, 05:53 IST<\/p>\n<\/div>\n<\/div>\n<div class=\"jsx-ee90caf6118df965 jsx-3313804306 brdcrmb\"><a href=\"https:\/\/www.news18.com\/\">News<\/a>  <a href=\"https:\/\/www.news18.com\/tech\/\">tech<\/a>  <span class=\"brdout\"> WhatsApp Users Haunted By New Horror Story As CERT-In Warns Of &#8216;GhostPairing&#8217; Risk<\/span><\/div>\n<div id=\"coral-wrap\" class=\"jsx-ba4d8f086a12294f \">\n<div class=\"jsx-ba4d8f086a12294f coral-cont\">\n<div class=\"jsx-ba4d8f086a12294f coltoptxt\">Disclaimer: Comments reflect users\u2019 views, not News18\u2019s. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our <a href=\"https:\/\/www.news18.com\/disclaimer\/\" class=\"jsx-ba4d8f086a12294f\">Terms of Use<\/a> and <a href=\"https:\/\/www.news18.com\/privacy_policy\/\" class=\"jsx-ba4d8f086a12294f\">Privacy Policy<\/a>.<\/div>\n<\/div>\n<\/div>\n<p><span class=\"jsx-ee90caf6118df965 jsx-3313804306 rmbtn news18_read_more\">Read More<\/span><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.news18.com\/tech\/whatsapp-users-haunted-by-new-horror-story-as-cert-in-warns-of-ghostpairing-risk-9783479.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last Updated:December 21, 2025, 05:53 IST The exploit allows malicious actors to take &#8216;complete&#8217;\u00a0control of a user&#8217;s WhatsApp account without needing a password, an OTP, or a physical SIM swap CERT-In has urged all Indian &#8216;Digital Nagriks&#8217; to exercise extreme caution when receiving unsolicited links, even from known contacts. Representational image India\u2019s premier cybersecurity agency,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":24206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[],"class_list":["post-26685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts\/26685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/comments?post=26685"}],"version-history":[{"count":0,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/posts\/26685\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/media\/24206"}],"wp:attachment":[{"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/media?parent=26685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/categories?post=26685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tezgyan.com\/index.php\/wp-json\/wp\/v2\/tags?post=26685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}