Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | Kaspersky official blog

0
Medium
Phishing
Published: Thu Oct 02 2025 (10/02/2025, 12:01:25 UTC)
Source: Kaspersky Security Blog

Description

We examine a new wave of phishing attacks targeting WhatsApp users, and explain how to avoid getting hacked.

AI-Powered Analysis

AILast updated: 10/15/2025, 01:40:09 UTC

Technical Analysis

This phishing campaign targets WhatsApp users by exploiting social engineering and the WhatsApp Web login mechanism. Attackers create convincing fake voting websites that appear legitimate, often themed around contests or polls, and available in multiple languages including English, German, Spanish, Turkish, Danish, and Bulgarian. Victims receive personalized messages, often from compromised contacts, urging them to vote by visiting these fake sites. Upon clicking 'Vote,' users are prompted to enter their phone number linked to WhatsApp and then a one-time verification code generated by WhatsApp. This code is displayed on the phishing site with instructions to enter it into the WhatsApp app to 'authorize' voting. When victims comply, attackers gain full access to the WhatsApp account, enabling them to read messages, send and delete messages, and impersonate the user. This access can be used to defraud contacts or propagate the phishing campaign further. The attack bypasses WhatsApp’s two-factor authentication because the one-time code is treated as a second factor by the system. The campaign uses AI and phishing kits to produce multilingual phishing pages, increasing its reach. Victims are advised to disconnect unknown linked devices immediately and follow detailed recovery guides. Preventive measures include avoiding suspicious polls, not clicking unknown links, enabling two-factor authentication, using passkeys, and employing advanced anti-phishing protections like Kaspersky’s multi-layered technology. The campaign highlights the risks of social engineering combined with messenger platform features and the importance of user awareness and technical safeguards.

Potential Impact

For European organizations, this phishing threat can lead to significant security and privacy breaches. Employees’ WhatsApp accounts can be hijacked, allowing attackers to access sensitive communications, impersonate users, and spread phishing links internally and externally. This can facilitate further social engineering attacks, fraud, and potential data leakage. Organizations relying on WhatsApp for business communications risk operational disruption and reputational damage if attackers misuse compromised accounts. The multilingual nature of the phishing pages increases the likelihood of successful attacks across diverse European countries. Additionally, the attack can undermine trust in communication platforms and complicate incident response efforts. While the attack requires user interaction, the widespread use of WhatsApp in Europe, including for informal and some business communications, amplifies the threat. The campaign may also indirectly affect organizations by targeting employees’ personal devices that connect to corporate networks, increasing the risk of lateral movement or credential theft.

Mitigation Recommendations

European organizations should implement targeted awareness campaigns educating employees about this specific phishing tactic, emphasizing skepticism toward unsolicited voting requests and the dangers of entering verification codes. Technical controls should include deploying advanced anti-phishing solutions capable of detecting and blocking malicious URLs in emails, social media, and messaging apps. Encourage employees to enable WhatsApp’s two-factor authentication and use passkeys where supported. Regularly audit and monitor linked devices in WhatsApp accounts to detect unauthorized sessions promptly. Organizations should establish clear policies restricting the use of personal messaging apps for sensitive communications and promote secure alternatives with enterprise-grade protections. IT teams can leverage mobile device management (MDM) solutions to enforce security configurations and monitor for suspicious app behavior. Additionally, integrating phishing simulation exercises that mimic this attack vector can improve user resilience. Finally, ensure that endpoint protection solutions include multi-layered phishing detection and that users are trained to verify URLs carefully and avoid entering personal data on untrusted sites.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/whatsapp-phishing-vote/54515/","fetched":true,"fetchedAt":"2025-10-07T01:33:06.789Z","wordCount":1650}

Threat ID: 68e46dd46a45552f36e9574a

Added to database: 10/7/2025, 1:33:08 AM

Last enriched: 10/15/2025, 1:40:09 AM

Last updated: 11/20/2025, 4:52:16 PM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats