Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | Kaspersky official blog

0
Medium
Phishing
Published: Thu Oct 02 2025 (10/02/2025, 12:01:25 UTC)
Source: Kaspersky Security Blog

Description

We examine a new wave of phishing attacks targeting WhatsApp users, and explain how to avoid getting hacked.

AI-Powered Analysis

AILast updated: 10/07/2025, 01:33:36 UTC

Technical Analysis

This phishing threat involves a multi-stage social engineering attack targeting WhatsApp users. Initially, attackers send personalized messages via social networks or messengers, often appearing to come from acquaintances, requesting votes for a contest. Victims are directed to convincingly crafted phishing websites that simulate legitimate voting polls, available in multiple languages, increasing their reach. Upon clicking 'Vote,' victims are prompted to enter their WhatsApp-associated phone number and then a one-time verification code generated by WhatsApp's device linking feature. The attackers use this code to link their device to the victim's WhatsApp account, gaining full access without needing the victim's password or two-factor authentication PIN. Once compromised, attackers can read conversations, impersonate the victim to defraud contacts, and spread the phishing campaign further. The attack leverages the inherent trust users place in social contacts and the convenience of WhatsApp's device linking process, exploiting users' inattentiveness to security warnings. No malware or advanced exploits are required, making the attack relatively easy to execute at scale. Kaspersky recommends avoiding suspicious links, enabling two-factor authentication, regularly reviewing linked devices, and using official app versions. Additional protections include phishing detection technologies and user education to recognize social engineering tactics.

Potential Impact

For European organizations, this threat poses significant risks primarily through social engineering targeting employees' personal WhatsApp accounts, which are often used for informal business communications. Account takeover can lead to identity impersonation, unauthorized access to sensitive conversations, and propagation of phishing links within professional networks, potentially compromising corporate data indirectly. The attack can facilitate business email compromise-like scenarios via messenger platforms, leading to financial fraud or data leakage. Moreover, compromised accounts can be used to spread misinformation or malware links, increasing organizational exposure. Given WhatsApp's widespread adoption across Europe, especially in countries with high mobile messaging usage, the threat can affect both individuals and businesses, undermining trust in communication channels and causing reputational damage. The ease of exploitation and social engineering nature mean even security-aware users can be vulnerable, necessitating proactive organizational measures.

Mitigation Recommendations

European organizations should implement targeted user awareness campaigns focusing on the risks of messenger phishing and social engineering, emphasizing skepticism towards unsolicited voting requests and links. Technical controls should include deployment of advanced phishing detection and URL filtering solutions capable of identifying and blocking fake voting sites and malicious links in messaging apps. Encourage employees to enable WhatsApp's two-factor authentication and regularly review linked devices to detect unauthorized access promptly. Organizations should establish policies discouraging the use of personal messaging apps for sensitive communications and promote secure alternatives with enterprise-grade protections. IT teams can monitor for unusual messaging patterns or reports of account compromises to respond swiftly. Additionally, integrating mobile threat defense solutions that provide multi-layered protection against phishing on mobile devices can reduce risk. Finally, ensure that employees only install official versions of messaging apps from trusted app stores and maintain updated devices to minimize vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/whatsapp-phishing-vote/54515/","fetched":true,"fetchedAt":"2025-10-07T01:33:06.789Z","wordCount":1650}

Threat ID: 68e46dd46a45552f36e9574a

Added to database: 10/7/2025, 1:33:08 AM

Last enriched: 10/7/2025, 1:33:36 AM

Last updated: 10/7/2025, 1:25:55 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats