How to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | Kaspersky official blog
We examine a new wave of phishing attacks targeting WhatsApp users, and explain how to avoid getting hacked.
AI Analysis
Technical Summary
This phishing campaign targets WhatsApp users by exploiting social engineering and the WhatsApp Web login mechanism. Attackers create convincing fake voting websites that appear legitimate, often themed around contests or polls, and available in multiple languages including English, German, Spanish, Turkish, Danish, and Bulgarian. Victims receive personalized messages, often from compromised contacts, urging them to vote by visiting these fake sites. Upon clicking 'Vote,' users are prompted to enter their phone number linked to WhatsApp and then a one-time verification code generated by WhatsApp. This code is displayed on the phishing site with instructions to enter it into the WhatsApp app to 'authorize' voting. When victims comply, attackers gain full access to the WhatsApp account, enabling them to read messages, send and delete messages, and impersonate the user. This access can be used to defraud contacts or propagate the phishing campaign further. The attack bypasses WhatsApp’s two-factor authentication because the one-time code is treated as a second factor by the system. The campaign uses AI and phishing kits to produce multilingual phishing pages, increasing its reach. Victims are advised to disconnect unknown linked devices immediately and follow detailed recovery guides. Preventive measures include avoiding suspicious polls, not clicking unknown links, enabling two-factor authentication, using passkeys, and employing advanced anti-phishing protections like Kaspersky’s multi-layered technology. The campaign highlights the risks of social engineering combined with messenger platform features and the importance of user awareness and technical safeguards.
Potential Impact
For European organizations, this phishing threat can lead to significant security and privacy breaches. Employees’ WhatsApp accounts can be hijacked, allowing attackers to access sensitive communications, impersonate users, and spread phishing links internally and externally. This can facilitate further social engineering attacks, fraud, and potential data leakage. Organizations relying on WhatsApp for business communications risk operational disruption and reputational damage if attackers misuse compromised accounts. The multilingual nature of the phishing pages increases the likelihood of successful attacks across diverse European countries. Additionally, the attack can undermine trust in communication platforms and complicate incident response efforts. While the attack requires user interaction, the widespread use of WhatsApp in Europe, including for informal and some business communications, amplifies the threat. The campaign may also indirectly affect organizations by targeting employees’ personal devices that connect to corporate networks, increasing the risk of lateral movement or credential theft.
Mitigation Recommendations
European organizations should implement targeted awareness campaigns educating employees about this specific phishing tactic, emphasizing skepticism toward unsolicited voting requests and the dangers of entering verification codes. Technical controls should include deploying advanced anti-phishing solutions capable of detecting and blocking malicious URLs in emails, social media, and messaging apps. Encourage employees to enable WhatsApp’s two-factor authentication and use passkeys where supported. Regularly audit and monitor linked devices in WhatsApp accounts to detect unauthorized sessions promptly. Organizations should establish clear policies restricting the use of personal messaging apps for sensitive communications and promote secure alternatives with enterprise-grade protections. IT teams can leverage mobile device management (MDM) solutions to enforce security configurations and monitor for suspicious app behavior. Additionally, integrating phishing simulation exercises that mimic this attack vector can improve user resilience. Finally, ensure that endpoint protection solutions include multi-layered phishing detection and that users are trained to verify URLs carefully and avoid entering personal data on untrusted sites.
Affected Countries
Germany, Spain, United Kingdom, France, Italy, Netherlands, Belgium, Denmark, Bulgaria, Turkey
How to protect yourself from "voting" phishing scams, and avoid losing your WhatsApp account | Kaspersky official blog
Description
We examine a new wave of phishing attacks targeting WhatsApp users, and explain how to avoid getting hacked.
AI-Powered Analysis
Technical Analysis
This phishing campaign targets WhatsApp users by exploiting social engineering and the WhatsApp Web login mechanism. Attackers create convincing fake voting websites that appear legitimate, often themed around contests or polls, and available in multiple languages including English, German, Spanish, Turkish, Danish, and Bulgarian. Victims receive personalized messages, often from compromised contacts, urging them to vote by visiting these fake sites. Upon clicking 'Vote,' users are prompted to enter their phone number linked to WhatsApp and then a one-time verification code generated by WhatsApp. This code is displayed on the phishing site with instructions to enter it into the WhatsApp app to 'authorize' voting. When victims comply, attackers gain full access to the WhatsApp account, enabling them to read messages, send and delete messages, and impersonate the user. This access can be used to defraud contacts or propagate the phishing campaign further. The attack bypasses WhatsApp’s two-factor authentication because the one-time code is treated as a second factor by the system. The campaign uses AI and phishing kits to produce multilingual phishing pages, increasing its reach. Victims are advised to disconnect unknown linked devices immediately and follow detailed recovery guides. Preventive measures include avoiding suspicious polls, not clicking unknown links, enabling two-factor authentication, using passkeys, and employing advanced anti-phishing protections like Kaspersky’s multi-layered technology. The campaign highlights the risks of social engineering combined with messenger platform features and the importance of user awareness and technical safeguards.
Potential Impact
For European organizations, this phishing threat can lead to significant security and privacy breaches. Employees’ WhatsApp accounts can be hijacked, allowing attackers to access sensitive communications, impersonate users, and spread phishing links internally and externally. This can facilitate further social engineering attacks, fraud, and potential data leakage. Organizations relying on WhatsApp for business communications risk operational disruption and reputational damage if attackers misuse compromised accounts. The multilingual nature of the phishing pages increases the likelihood of successful attacks across diverse European countries. Additionally, the attack can undermine trust in communication platforms and complicate incident response efforts. While the attack requires user interaction, the widespread use of WhatsApp in Europe, including for informal and some business communications, amplifies the threat. The campaign may also indirectly affect organizations by targeting employees’ personal devices that connect to corporate networks, increasing the risk of lateral movement or credential theft.
Mitigation Recommendations
European organizations should implement targeted awareness campaigns educating employees about this specific phishing tactic, emphasizing skepticism toward unsolicited voting requests and the dangers of entering verification codes. Technical controls should include deploying advanced anti-phishing solutions capable of detecting and blocking malicious URLs in emails, social media, and messaging apps. Encourage employees to enable WhatsApp’s two-factor authentication and use passkeys where supported. Regularly audit and monitor linked devices in WhatsApp accounts to detect unauthorized sessions promptly. Organizations should establish clear policies restricting the use of personal messaging apps for sensitive communications and promote secure alternatives with enterprise-grade protections. IT teams can leverage mobile device management (MDM) solutions to enforce security configurations and monitor for suspicious app behavior. Additionally, integrating phishing simulation exercises that mimic this attack vector can improve user resilience. Finally, ensure that endpoint protection solutions include multi-layered phishing detection and that users are trained to verify URLs carefully and avoid entering personal data on untrusted sites.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/whatsapp-phishing-vote/54515/","fetched":true,"fetchedAt":"2025-10-07T01:33:06.789Z","wordCount":1650}
Threat ID: 68e46dd46a45552f36e9574a
Added to database: 10/7/2025, 1:33:08 AM
Last enriched: 10/15/2025, 1:40:09 AM
Last updated: 11/20/2025, 4:52:16 PM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Is Supercharging Phishing: Here’s How to Fight Back
MediumSeven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Medium5 Reasons Why Attackers Are Phishing Over LinkedIn
MediumGoogle Looks to Dim 'Lighthouse' Phishing-as-a-Service Op
MediumDarkComet RAT Resurfaces Disguised as Bitcoin Wallet
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.