Privacy rankings of popular messaging apps in 2025 | Kaspersky official blog
Comparing WhatsApp, Discord, Snapchat, Facebook Messenger, and Telegram, based on their privacy settings and the amount of data they collect.
AI Analysis
Technical Summary
The threat analysis is based on a 2025 privacy ranking study by Incogni, published on the Kaspersky blog, comparing popular messaging apps: Discord, Telegram, Snapchat, Facebook Messenger, and WhatsApp. The study evaluates these apps across 18 criteria, focusing on privacy settings, data collection practices, government data request compliance, and protection against unauthorized access. Discord ranks highest overall due to limited data collection and a clean record on privacy fines but has less private default settings. Telegram and Snapchat excel in privacy settings and default configurations, with Telegram collecting the least data and offering the most granular privacy controls. WhatsApp, while ranking lower overall, uniquely provides end-to-end encryption by default for all chats, a critical privacy feature not matched by Telegram. The study highlights concerns such as WhatsApp's use of chat data for AI training without opt-out options, government data request compliance rates (Snapchat at 82%, Meta services at 78%, Discord at 77.4%), and the vulnerability of desktop and third-party clients to malicious modifications. The threat lies in the potential exposure of sensitive communications through data collection, social engineering attacks, and government surveillance. The analysis emphasizes that default privacy settings and user control are crucial, as many users do not adjust settings post-installation. The study also notes that official mobile clients are more secure than desktop or modded versions, which are often targeted by attackers. Overall, the threat is a privacy and security risk stemming from app design choices, data handling policies, and user behavior, rather than a direct software vulnerability.
Potential Impact
For European organizations, the impact of these privacy weaknesses in messaging apps can be significant. Sensitive corporate communications could be exposed through data collection practices or social engineering attacks exploiting weak default privacy settings. The lack of end-to-end encryption in some apps (e.g., Telegram by default) increases the risk of interception or unauthorized access, potentially leading to data breaches or espionage. Government data request compliance rates raise concerns about surveillance and data privacy under European data protection laws such as GDPR. Organizations using these apps for internal or external communication risk non-compliance with privacy regulations if personal or sensitive data is inadequately protected. Additionally, phishing and account hijacking risks can lead to credential theft and unauthorized access to corporate networks. The widespread use of these apps across Europe means that a large number of employees and stakeholders could be affected, increasing the attack surface. The presence of malicious third-party clients and desktop vulnerabilities further exacerbates risks. Overall, these privacy and security gaps could undermine trust, cause reputational damage, and result in financial penalties for organizations failing to safeguard communications.
Mitigation Recommendations
European organizations should implement several targeted measures beyond generic advice: 1) Enforce the use of messaging apps with strong default privacy settings and end-to-end encryption, prioritizing WhatsApp for sensitive communications or specialized secure messaging platforms. 2) Develop and mandate privacy configuration guidelines for employees, ensuring default settings are hardened immediately after installation. 3) Prohibit the use of unofficial or third-party clients and desktop versions known to be vulnerable or maliciously modified. 4) Conduct regular user awareness training focused on phishing, social engineering, and account hijacking risks specific to messaging apps. 5) Monitor and audit app usage to detect anomalous access patterns or unauthorized data sharing. 6) Leverage endpoint security solutions that can block malicious links and phishing attempts within messaging notifications, such as Kaspersky for Android. 7) Establish clear policies on data sharing and retention in messaging apps to comply with GDPR and other privacy regulations. 8) Engage with vendors to understand their data handling and government request policies and prefer those with transparent, privacy-respecting practices. 9) Consider deploying enterprise-grade secure communication tools for highly sensitive discussions instead of consumer-grade apps. 10) Regularly review and update security policies as app privacy features evolve.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Norway, Denmark, Finland, Belgium, Italy, Spain
Privacy rankings of popular messaging apps in 2025 | Kaspersky official blog
Description
Comparing WhatsApp, Discord, Snapchat, Facebook Messenger, and Telegram, based on their privacy settings and the amount of data they collect.
AI-Powered Analysis
Technical Analysis
The threat analysis is based on a 2025 privacy ranking study by Incogni, published on the Kaspersky blog, comparing popular messaging apps: Discord, Telegram, Snapchat, Facebook Messenger, and WhatsApp. The study evaluates these apps across 18 criteria, focusing on privacy settings, data collection practices, government data request compliance, and protection against unauthorized access. Discord ranks highest overall due to limited data collection and a clean record on privacy fines but has less private default settings. Telegram and Snapchat excel in privacy settings and default configurations, with Telegram collecting the least data and offering the most granular privacy controls. WhatsApp, while ranking lower overall, uniquely provides end-to-end encryption by default for all chats, a critical privacy feature not matched by Telegram. The study highlights concerns such as WhatsApp's use of chat data for AI training without opt-out options, government data request compliance rates (Snapchat at 82%, Meta services at 78%, Discord at 77.4%), and the vulnerability of desktop and third-party clients to malicious modifications. The threat lies in the potential exposure of sensitive communications through data collection, social engineering attacks, and government surveillance. The analysis emphasizes that default privacy settings and user control are crucial, as many users do not adjust settings post-installation. The study also notes that official mobile clients are more secure than desktop or modded versions, which are often targeted by attackers. Overall, the threat is a privacy and security risk stemming from app design choices, data handling policies, and user behavior, rather than a direct software vulnerability.
Potential Impact
For European organizations, the impact of these privacy weaknesses in messaging apps can be significant. Sensitive corporate communications could be exposed through data collection practices or social engineering attacks exploiting weak default privacy settings. The lack of end-to-end encryption in some apps (e.g., Telegram by default) increases the risk of interception or unauthorized access, potentially leading to data breaches or espionage. Government data request compliance rates raise concerns about surveillance and data privacy under European data protection laws such as GDPR. Organizations using these apps for internal or external communication risk non-compliance with privacy regulations if personal or sensitive data is inadequately protected. Additionally, phishing and account hijacking risks can lead to credential theft and unauthorized access to corporate networks. The widespread use of these apps across Europe means that a large number of employees and stakeholders could be affected, increasing the attack surface. The presence of malicious third-party clients and desktop vulnerabilities further exacerbates risks. Overall, these privacy and security gaps could undermine trust, cause reputational damage, and result in financial penalties for organizations failing to safeguard communications.
Mitigation Recommendations
European organizations should implement several targeted measures beyond generic advice: 1) Enforce the use of messaging apps with strong default privacy settings and end-to-end encryption, prioritizing WhatsApp for sensitive communications or specialized secure messaging platforms. 2) Develop and mandate privacy configuration guidelines for employees, ensuring default settings are hardened immediately after installation. 3) Prohibit the use of unofficial or third-party clients and desktop versions known to be vulnerable or maliciously modified. 4) Conduct regular user awareness training focused on phishing, social engineering, and account hijacking risks specific to messaging apps. 5) Monitor and audit app usage to detect anomalous access patterns or unauthorized data sharing. 6) Leverage endpoint security solutions that can block malicious links and phishing attempts within messaging notifications, such as Kaspersky for Android. 7) Establish clear policies on data sharing and retention in messaging apps to comply with GDPR and other privacy regulations. 8) Engage with vendors to understand their data handling and government request policies and prefer those with transparent, privacy-respecting practices. 9) Consider deploying enterprise-grade secure communication tools for highly sensitive discussions instead of consumer-grade apps. 10) Regularly review and update security policies as app privacy features evolve.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/messengers-privacy-rating-2025/54665/","fetched":true,"fetchedAt":"2025-10-24T16:18:28.546Z","wordCount":1636}
Threat ID: 68fba6d444c617250775d1ec
Added to database: 10/24/2025, 4:18:28 PM
Last enriched: 10/24/2025, 4:18:51 PM
Last updated: 10/25/2025, 10:33:29 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8483: CWE-94 Improper Control of Generation of Code ('Code Injection') in marketingfire Discussion Board – WordPress Forum Plugin
MediumCVE-2025-12034: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alignak Fast Velocity Minify
MediumCVE-2025-11976: CWE-352 Cross-Site Request Forgery (CSRF) in fusewp FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.)
MediumCVE-2025-11875: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dr-thomas-fuessl SpendeOnline.org
MediumCVE-2025-11497: CWE-20 Improper Input Validation in symptote Advanced Database Cleaner
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.