A sophisticated yet low-tech method for hijacking WhatsApp accounts is gaining traction, as reported by security researchers on December 21, 2025. The attack does not exploit a software vulnerability but rather a procedural weakness in the telecommunications sector. Threat actors, including the North Korea-linked group APT37 (also known as Reaper or ScarCruft), are using SIM swapping to take control of victims' phone numbers. By socially engineering mobile carrier employees, they transfer the target's number to their own SIM card. This allows them to intercept the SMS verification code sent by WhatsApp during a new installation, effectively seizing control of the account and bypassing conventional security like strong passwords.
The attack flow is straightforward but effective:
This method completely bypasses any security on the victim's physical phone and does not require cracking passwords or exploiting software. Its success hinges entirely on the manipulation of human employees at telecom companies.
This is primarily a social engineering and process-based attack, not a technical exploit of WhatsApp itself.
T1655 - SIM Swapping: This is the core technique of the attack, involving the unauthorized transfer of a phone number to an attacker-controlled SIM.T1589 - Gather Victim Identity Information: Before the attack, threat actors gather PII (e.g., date of birth, address) to successfully impersonate the victim to the mobile carrier.T1586.003 - Compromise Accounts: Social Media Accounts: While WhatsApp is a messaging app, its takeover falls under this category as it's a compromise of a user's account on a major communication platform.The impact for a victim is severe. They immediately lose access to their WhatsApp account, including all communications and contacts. The attacker gains the ability to impersonate the victim, potentially defrauding their contacts, spreading misinformation, or accessing sensitive information shared in chat histories (if not end-to-end encrypted and cloud backups are compromised). For high-profile targets like journalists or activists, this could lead to the exposure of sources and sensitive work. The link to a state-sponsored group like APT37 suggests the technique is being used for espionage and intelligence gathering.
Detection for the victim is abrupt: their phone will suddenly lose cellular service, and WhatsApp will show a message that the account is registered on another device.
Mitigation involves both user-level and carrier-level actions.
Settings > Account > Two-Step Verification and set a six-digit PIN. This PIN is required when registering the phone number on a new device, acting as a second factor that the attacker will not have, even if they successfully swap the SIM.Enabling WhatsApp's Two-Step Verification PIN adds a knowledge-based factor that the attacker does not possess, even if they control the phone number.
Mapped D3FEND Techniques:
Educating users about the risks of SIM swapping and the importance of enabling security features like the WhatsApp PIN and carrier account PINs.
Applies to mobile carriers, who should require a strong, separate PIN or password for authorizing high-risk account changes like SIM swaps.
Mapped D3FEND Techniques:
The most effective defense against this specific WhatsApp hijacking technique is to enable the app's built-in Two-Step Verification feature. This feature requires you to create a six-digit PIN that is separate from the SMS verification code. Once enabled, this PIN must be entered whenever your phone number is registered with WhatsApp on a new device. Since the SIM-swapping attacker only controls the phone number (the 'something you have' factor), they will be stopped when prompted for the PIN (the 'something you know' factor). All users should be instructed to navigate to Settings > Account > Two-Step Verification in their WhatsApp application and enable this feature immediately. This simple step effectively neutralizes the primary threat from SIM-swapping attacks targeting WhatsApp.
Mobile carriers must improve their own security processes to prevent fraudulent SIM swaps. The tactical recommendation is for carriers to require a separate, customer-defined security PIN or password for any high-risk transaction, including SIM swaps or number porting. This PIN should be explicitly required by the customer service agent before proceeding. Furthermore, after a certain number of failed authentication attempts, the account should be temporarily locked, and a notification should be sent to the customer via multiple channels (e.g., email and SMS). This creates a significant barrier for social engineers and provides an early warning to the legitimate account holder. Customers should proactively call their carriers and ask to have this level of protection added to their accounts.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats