{"id":1198,"date":"2021-04-14T04:43:40","date_gmt":"2021-04-14T03:43:40","guid":{"rendered":"https:\/\/zerothcode.com\/blog\/?p=1198"},"modified":"2021-04-14T04:43:40","modified_gmt":"2021-04-14T03:43:40","slug":"whatsapp-hack-hackers-need-phone-no-block-whatsapp","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/whatsapp-hack-hackers-need-phone-no-block-whatsapp\/","title":{"rendered":"Hackers only Need Phone Number to Block Your WhatsApp Account"},"content":{"rendered":"<h2>Hackers only Need Phone Number to Block Your WhatsApp Account &#8211; whatsapp hack<\/h2>\n<h3 class=\"entry-title\">New WhatsApp Security Flaw Might Allow Attacker to Suspend your Account &#8211; whatsapp hack<\/h3>\n<p>whatsapp hack &#8211; All Whatsapp users must beware of a new <strong>Whatsapp security flaw<\/strong>\u00a0that allows anyone to\u00a0<strong>deactivate your account<\/strong>\u00a0using your phone number.<\/p>\n<p>The hackers\u00a0<strong>don\u2019t need any information<\/strong>\u00a0about the user except the phone number. In this flaw, the attacker can block your account but will not gain any access to it.<\/p>\n<p>The security researchers Luis Marquez Carpintero and Ernesto Canales Perena first discovered the flaw in the most popular messaging app. According to the researchers, the hackers first\u00a0<strong>download the app<\/strong>\u00a0on their phones and tries to<strong>\u00a0log in<\/strong>\u00a0by using the victim\u2019s phone number.<\/p>\n<p>However, when they try to log in, the victim gets a\u00a0<strong>two-factor authentication code<\/strong>\u00a0which is sent by Whatsapp. As the attacker does not get the code, and he keeps repeating the process and due to failed attempts,\u00a0<strong>Whatsapp disables the login process for 12 hours.<\/strong>\u00a0With this, even the victim can\u2019t log in to their account for the given period of time.<\/p>\n<p>As the attacker couldn\u2019t do anything by login, now they try to <strong>send an email to Whatsapp.<\/strong>\u00a0In the email, they claim that the phone number (the victim\u2019s phone number) is lost or stolen so that account needs to be deactivated.<\/p>\n<p>Without cross-checking,\u00a0<strong>Whatsapp verifies it and suspends your account.<\/strong> And if the process is repeated, then Whatsapp might permanently lock your account. whatsapp hack<\/p>\n<p>ESET\u2019s Jake Moore told,<\/p>\n<p>There is no way of opting out of being discovered on WhatsApp. Anyone can type in a phone number to locate the associated account if it exists.<\/p>\n<p>Ideally, a move towards being more privacy-focused would help protect users from this, as well as forcing people to implement a two-step verification PIN.<\/p>\n<p>Regarding the Whatsapp security flaw, a spokesperson told to Forbes, that \u201cgiving an email address with two-step verification helps the customer service team to avoid this scenario, but still, Whatsapp has responsibility.<\/p>\n<p>At present, there is no solution to this security flaw and Whatsapp has also not provided any details on whether they are fixing it or not.<\/p>\n<p>Whatsapp is one of the most popular apps with a huge user base of billions of users globally. At this moment, there are many users who have not registered their accounts with their email addresses.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/zerothcode.com\/blog\/mobikwik-suffers-major-breach-kyc-data-3-5-million-users-exposed\/\">Read More: https:\/\/zerothcode.com\/blog\/mobikwik-suffers-major-breach-kyc-data-3-5-million-users-exposed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers only Need Phone Number to Block Your WhatsApp Account &#8211; whatsapp hack New WhatsApp Security Flaw Might Allow Attacker<\/p>\n","protected":false},"author":1,"featured_media":1199,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[1188,494,352,1002,625,1333,260],"class_list":["post-1198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1198"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1199"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1198"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}