New WhatsApp Hijack Method Bypasses 2FA via SIM Swapping Attacks

Security Researchers Warn of SIM Swapping Technique Used by APT37 to Hijack WhatsApp Accounts

HIGH
December 22, 2025
5m read
PhishingThreat ActorMobile Security

Related Entities

Threat Actors

Products & Tech

Full Report

Executive Summary

A sophisticated yet low-tech method for hijacking WhatsApp accounts is gaining traction, as reported by security researchers on December 21, 2025. The attack does not exploit a software vulnerability but rather a procedural weakness in the telecommunications sector. Threat actors, including the North Korea-linked group APT37 (also known as Reaper or ScarCruft), are using SIM swapping to take control of victims' phone numbers. By socially engineering mobile carrier employees, they transfer the target's number to their own SIM card. This allows them to intercept the SMS verification code sent by WhatsApp during a new installation, effectively seizing control of the account and bypassing conventional security like strong passwords.

Threat Overview

The attack flow is straightforward but effective:

  1. Reconnaissance: The attacker gathers personal information about the target, often from public sources or previous data breaches, to impersonate them convincingly.
  2. Social Engineering: The attacker contacts the victim's mobile carrier and, using the gathered information, tricks the customer service representative into porting the phone number to a new SIM card in the attacker's possession.
  3. Account Takeover: With control of the phone number, the attacker installs WhatsApp on a new device. WhatsApp sends a one-time password (OTP) via SMS to the registered number, which the attacker now receives. They enter the code and gain full access to the WhatsApp account, simultaneously deactivating it on the victim's device.

This method completely bypasses any security on the victim's physical phone and does not require cracking passwords or exploiting software. Its success hinges entirely on the manipulation of human employees at telecom companies.

Technical Analysis

This is primarily a social engineering and process-based attack, not a technical exploit of WhatsApp itself.

TTPs and MITRE ATT&CK Mapping

Impact Assessment

The impact for a victim is severe. They immediately lose access to their WhatsApp account, including all communications and contacts. The attacker gains the ability to impersonate the victim, potentially defrauding their contacts, spreading misinformation, or accessing sensitive information shared in chat histories (if not end-to-end encrypted and cloud backups are compromised). For high-profile targets like journalists or activists, this could lead to the exposure of sources and sensitive work. The link to a state-sponsored group like APT37 suggests the technique is being used for espionage and intelligence gathering.

Detection & Response

Detection for the victim is abrupt: their phone will suddenly lose cellular service, and WhatsApp will show a message that the account is registered on another device.

  1. Immediate Carrier Contact: If you suddenly lose all mobile service for no apparent reason, contact your carrier immediately from another phone to report a potential unauthorized SIM swap.
  2. Re-register Account: If possible, try to re-register your WhatsApp account immediately to reclaim it before the attacker can enable two-step verification with their own PIN.
  3. Notify Contacts: Inform your contacts through other channels that your WhatsApp may be compromised.

Mitigation

Mitigation involves both user-level and carrier-level actions.

  1. Enable WhatsApp Two-Step Verification: This is the most critical user-side mitigation. In WhatsApp, go to Settings > Account > Two-Step Verification and set a six-digit PIN. This PIN is required when registering the phone number on a new device, acting as a second factor that the attacker will not have, even if they successfully swap the SIM.
  2. Carrier Account Security: Contact your mobile provider and ask for enhanced security on your account. Many carriers offer options like a port-out password or PIN that must be provided before any major changes, like a SIM swap, can be made.
  3. Be Wary of Phishing: Do not share personal information in response to unsolicited emails or messages, as this data can be used to fuel social engineering attacks against your service providers.
  4. D3FEND Countermeasures: While primarily a user and carrier issue, principles from D3-SPP: Strong Password Policy can be applied by carriers to customer accounts. The most relevant D3FEND technique for users is enabling the app-specific second factor, which is an implementation of D3-MFA: Multi-factor Authentication.

Timeline of Events

1
December 21, 2025
Security researchers issue a warning about the growing use of SIM swapping to hijack WhatsApp accounts.
2
December 22, 2025
This article was published

MITRE ATT&CK Mitigations

Enabling WhatsApp's Two-Step Verification PIN adds a knowledge-based factor that the attacker does not possess, even if they control the phone number.

Mapped D3FEND Techniques:

Educating users about the risks of SIM swapping and the importance of enabling security features like the WhatsApp PIN and carrier account PINs.

Applies to mobile carriers, who should require a strong, separate PIN or password for authorizing high-risk account changes like SIM swaps.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most effective defense against this specific WhatsApp hijacking technique is to enable the app's built-in Two-Step Verification feature. This feature requires you to create a six-digit PIN that is separate from the SMS verification code. Once enabled, this PIN must be entered whenever your phone number is registered with WhatsApp on a new device. Since the SIM-swapping attacker only controls the phone number (the 'something you have' factor), they will be stopped when prompted for the PIN (the 'something you know' factor). All users should be instructed to navigate to Settings > Account > Two-Step Verification in their WhatsApp application and enable this feature immediately. This simple step effectively neutralizes the primary threat from SIM-swapping attacks targeting WhatsApp.

Mobile carriers must improve their own security processes to prevent fraudulent SIM swaps. The tactical recommendation is for carriers to require a separate, customer-defined security PIN or password for any high-risk transaction, including SIM swaps or number porting. This PIN should be explicitly required by the customer service agent before proceeding. Furthermore, after a certain number of failed authentication attempts, the account should be temporarily locked, and a notification should be sent to the customer via multiple channels (e.g., email and SMS). This creates a significant barrier for social engineers and provides an early warning to the legitimate account holder. Customers should proactively call their carriers and ask to have this level of protection added to their accounts.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SIM SwappingWhatsAppAccount TakeoverSocial EngineeringAPT37Mobile Security

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading