India's Computer Emergency Response Team (CERT-In) issued a high-severity advisory on December 19, 2025, warning of a social engineering campaign named "GhostPairing." This attack targets WhatsApp users by exploiting the platform's legitimate 'Link a device' feature. Attackers trick victims into visiting a malicious website and scanning a QR code or entering a pairing code, which then links the attacker's device to the victim's WhatsApp account as a 'companion' device. Once linked, the attacker gains persistent, real-time access to the victim's chats, contacts, and media. The attack is particularly insidious because it does not require stealing the victim's password or phone, nor does it involve a traditional SIM swap. It relies entirely on social engineering to manipulate the user into authorizing the attacker's access.
The "GhostPairing" attack is a classic example of social engineering fused with the abuse of a legitimate application feature. The attack flow is as follows:
Settings > Linked Devices > Link a Device) or provide a one-time code to be entered on the page.This is not a technical vulnerability in WhatsApp, but rather an abuse of a feature by design. The core of the attack is social engineering.
The impact of a successful GhostPairing attack can be severe:
Detection of a GhostPairing compromise relies on user vigilance.
D3FEND Reference: D3-LUC: Linked-device User Content Heuristics (Conceptual)
WhatsApp Settings > Linked Devices. This screen will show all computers and devices currently linked to the account. Any device that is not recognized should be immediately logged out by tapping on it and selecting 'Log Out'.Mitigation is entirely based on user awareness and cautious behavior.
D3FEND Reference: D3-UT: User Training
Settings > Account > Two-Step Verification) provides a crucial layer of protection against other account takeover methods like SIM swapping.The primary defense against social engineering attacks like GhostPairing is user education and awareness.
Encouraging users to regularly review account settings, such as linked devices, is a key defensive habit.
Since GhostPairing is a pure social engineering attack that exploits user trust and misunderstanding of a feature, the primary and most effective countermeasure is user education. Organizations and individuals must be trained to recognize the tactics of such attacks. Key training points should include: 1) A firm rule to never scan a WhatsApp QR code or enter a pairing code from any website or at the request of another person. The 'Link a Device' feature is ONLY for linking one's own personal computer. 2) Cultivating a healthy skepticism towards unsolicited messages, even from known contacts, that contain urgent requests or suspicious links. 3) The importance of verifying unusual requests through a separate communication channel. 4) A step-by-step guide on how to regularly check the 'Linked Devices' section in WhatsApp settings and how to log out any unrecognized devices. This training transforms the user from a potential victim into the first line of defense.
In the context of the GhostPairing attack, 'Local Account Monitoring' translates to users actively monitoring their own WhatsApp account's security settings. Users should be encouraged to make it a regular habit, perhaps weekly, to navigate to 'Settings > Linked Devices' within the WhatsApp application. This screen provides a direct audit log of all active sessions linked to the account. By reviewing this list, the user can immediately spot any device they do not recognize. The presence of an unknown device (e.g., 'Google Chrome on Windows' when the user owns a Mac) is a definitive indicator of compromise. Users must know how to select the unrecognized device and tap 'Log Out' to immediately evict the attacker. This simple, proactive self-auditing behavior is the most direct method for detecting and responding to a successful GhostPairing attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats