Hack WhatsApp by call forwarding trick

How Does It Work?

It has been discovered that Whatsapp accounts can been breached by hackers using call forwarding.

Malicious threat actors can now gain control of your WhatsApp account using a hacking technique called call forwarding. This method is not necessarily the easiest as it requires quick responsiveness and social skills on the part of the threat actors.

However, to the skilled and experienced hackers, this could also mean taking control of a user’s account within just a few minutes.

There is a loophole that allows malicious actors to take control of the user’s account of an unsuspecting victim and read their private messages as well as their contact list.

WhatsApp’s Call Forwarding-How Does It Work?

WhatsApp, Meta’s instant messaging app, has a loophole that allows malicious actors to take control of any user’s account.

Call forwarding, the technique that can be used, makes use of an automatic feature provided by mobile carriers that redirects incoming calls to a different phone number, as well as an option provided by WhatsApp to transmit a verification code for a one-time password (OTP) through a voice call.

The founder and CEO of cybersecurity company cloudSEK, Rahul Sasi also confirmed that call forwarding provides success when it comes to breaching someone’s account in the messaging app. Sasi released some specifics regarding the method, indicating that it is used to hack WhatsApp accounts.

He added that the malicious actor must first persuade the victim to place a call to a number that begins with a Man Machine Interface (MMI) code that was set up by the cell carrier to facilitate call forwarding.

According to Bleeping Computer, Rahul Sasi stated, “First, you receive a call from the attacker, who will convince you to make a call to the following numbers: **67* or *405*. Within a few minutes, your WhatsApp would be logged out, and the attackers would get complete control of your account.”

The first character of these codes is either a star (*) or a hash (#). They are not difficult to locate, and according to the testing that was tried out, the majority of the main mobile network operators support them.

On some cell carriers, a particular MMI code can either redirect all calls to a terminal to a different number or redirect the calls that come in when the line is busy or there is no reception.

If hackers are successful in convincing the victim to forward calls to their number, the malicious actor will begin the WhatsApp registration procedure on their own device, selecting the option that allows them to receive the one-time password (OTP) by voice call.

After obtaining the OTP, the malicious user can register the victim’s WhatsApp account on their own device and turn on two-factor authentication (2FA), which prohibits the account’s rightful owners from regaining access to it.

How To Prevent Call Hacking

Call forwarding is just one of the numerous ways malicious actors can breach someone’s phone. However, there is also SIM swapping, and phishing emails and text messages as methods of attack.

In addition, nowadays, threat actors now use public Wi-Fi networks. They can create fake Wi-Fi networks to lure users who are in need of an internet connection, and when victims connect through their network, it will lead them to phony sites that will help them launch an attack.

According to MUO, it is highly recommended for users to not connect to any Wi-Fi network to prevent hacking. It is also advised that users turn off hotspots in crowded places.

With the call forwarding strategy, users are advised to not permit any access from an unknown caller. In addition, it is worth remembering that the two-factor authentication can help users add in that extra layer of protection and security. However, in this case, users must use it wisely to their advantage instead of allowing this tool to launch a hack on their devices.

Reference: Go to Homepage ELAIN BROWN

  Posted by: @ESPYER

Facebook
Twitter
LinkedIn

The Thrilling Adventure of Digital Sleuthing with IRBIS

In the rapidly expanding digital world, IRBIS stands out as a revolutionary online platform for gathering digital intelligence. It offers a host of powerful tools, including deep web searches, facial recognition, and social media analysis, making the process of uncovering hidden insights on the internet simple yet efficient. What sets IRBIS apart is its use of proxy server technology, exemplified by providers like Oxylabs.io. This feature enhances privacy, speed, and access to geo-blocked content, making IRBIS an invaluable tool for both professionals and tech enthusiasts. Using IRBIS is akin to becoming a digital detective, equipped with a cutting-edge toolkit that makes the exploration of the online world an exhilarating experience.

Read More »

Unveiling the Power of Facial Recognition

Discover how the advanced facial recognition technology of Botodetective can revolutionize online investigations. With the ability to search for information about individuals using just their face picture, Botodetective offers a powerful tool for uncovering online presence and conducting thorough investigations. Dive into the world of AI-driven facial recognition and explore how this innovative technology is reshaping the landscape of online investigations. Unleash the potential of Botodetective and unlock a wealth of information with just a simple face picture. Stay ahead of the game and gain valuable insights into individuals’ online activities. Upgrade your investigative capabilities today with Botodetective’s facial recognition feature.

Read More »

Mystic Faces Revealed: Crack the Code of the Unknown with Facial Photo Search

Unleash the Epic Secrets: Master the Art of Discovery with Irbis.espysys.com

Are you curious to delve deeper into the lives of the people you encounter? With Irbis.espysys.com, you have the ultimate tool at your fingertips. This eye-catching article introduces the power of Irbis.espysys.com, an innovative platform that allows you to gather information about others based on phone numbers, names, email addresses, and even photos.

Discover the thrill of uncovering hidden truths about your date or satisfying your curiosity about someone you’ve crossed paths with on the street. Dive into the world of Irbis and witness its advanced facial recognition technology that can identify individuals and provide valuable insights.

Learn how to responsibly navigate this powerful tool and respect the privacy of others as you unlock the secrets that lie beneath the surface. Explore a world of endless possibilities, backed by a secure and encrypted environment.

Join us on this exciting journey and let Irbis.espysys.com become your guide in unraveling the mysteries that surround us. Unleash the epic secrets and master the art of discovery today!

Read More »

The Atypical OSINT Guide

This article explores the OffcierCia non-typical OSINT guide on GitHub, which is a library of materials for learning how to conduct open source intelligence (OSINT) investigations. The guide is intended for bored professionals and provides a wide range of unusual OSINT techniques and tools. The article covers the various sections of the guide, including immersive and gamified learning, training and practicing, external data, and more. It also includes a disclaimer that all information is for educational purposes only and based on public sources. The article aims to inform readers about this valuable resource for improving their OSINT skills.

Read More »

Revolutionize Your Instagram Game with AutoGPT-Social

Introducing AutoGPT-Social, an AI-powered tool designed to revolutionize your Instagram content strategy. By automatically generating eye-catching images, captions, and hashtags, this innovative bot optimizes posting schedules based on real-time feedback to maximize engagement. With customizable post frequency settings and automatic hashtag discovery, AutoGPT-Social simplifies content creation, helping you attract likes and followers with ease. To get started, visit the project’s GitHub page: https://github.com/WillReynolds5/AutoGPT-Social. Please use the bot responsibly and at your own risk.

#AutoGPTSocial #InstagramGrowth #AIContentGenerator #MaximizeEngagement

Read More »
dating

Is Your Date Who They Say They Are?

This article highlights the importance of background checks not just for employers, but for individuals as well. It explains how background checks can be helpful for online dating, childcare, and renting out property. The article also mentions ClearCheck.io, a website that offers background check services with an easy-to-use platform and informative blog. The article emphasizes that conducting a background check can provide peace of mind and help make informed decisions about the people in your life.

Read More »