A growing cyber threat targeting WhatsApp users, known as “ghost pairing,” allows scammers to link their device to a user’s account without needing passwords or SIM card access. Unlike traditional hacks, this attack exploits WhatsApp’s legitimate “Linked Devices” feature to gain real-time access to messages, media, and chats while remaining completely invisible to the user.
How the Ghost Pairing Attack Works
The attack relies on social engineering rather than technical exploits. Victims often receive a message from a contact whose account has already been compromised, with hooks like “Hey, I found your photo!” or “Check out this video.”
Clicking the link takes users to a fake verification page, often disguised as a Facebook login. The site asks for the victim’s phone number to “verify” their identity. This number is then sent to WhatsApp’s official device-linking system, which generates a pairing code. The scammer’s site displays this code and prompts the user to enter it into their WhatsApp app. Because it appears as a standard security step, many comply, unknowingly authorizing the attacker’s browser or device.
Why It’s Dangerous
Once linked, the attacker can monitor all messages, download photos and videos, and even send messages to the user’s contacts to propagate the scam. The attack is invisible—users continue to use WhatsApp normally, and the link can remain active for months unless manually removed.
How to Protect Yourself
- Check Linked Devices Regularly: Go to WhatsApp Settings > Linked Devices. If you see an unfamiliar device, such as “Google Chrome (Windows)” that you did not set up, tap it and select Log Out immediately.
- Do Not Share Codes: Never enter verification or pairing codes unless you personally initiated the login.
- Enable Two-Step Verification: Set up a custom PIN to add an extra layer of protection against unauthorized access.
- Avoid Suspicious Links: Be cautious of links from friends or unknown sources, especially those creating a sense of urgency or curiosity.
“Ghost pairing” demonstrates how cybercriminals can exploit trust and legitimate features rather than technical vulnerabilities, highlighting the importance of vigilance in digital security. Regularly monitoring linked devices and enabling extra verification steps can prevent unauthorized access and keep your private conversations safe.