A recent investigation by cybersecurity firm Gen Digital has uncovered a social engineering campaign known as “GhostPairing Attack.” Unlike traditional hacks that rely on malware or password theft, this vulnerability exploits WhatsApp’s legitimate “Linked Devices” feature to give attackers full, persistent access to a victim’s account.
Here is a detailed breakdown of how the attack works, what the risks are, and how you can stay protected.
How the GhostPairing Attack Works
The attack is particularly effective because it uses a “chain of trust.” It typically follows these steps:
- The Trap: You receive a WhatsApp message from a known contact (someone whose account has already been compromised). The message is brief and informal, often saying something like, “Hey, I just found your photo!” accompanied by a link.
- The Fake Landing Page: Clicking the link takes you to a website designed to look like a Facebook photo viewer. To “see” the photo, the site asks you to “verify” your identity.
- The Pairing Request: The site prompts you to enter your phone number. Behind the scenes, the attacker’s server sends this number to the official WhatsApp Web/Desktop login page.
- The Code Entry: WhatsApp sends a legitimate push notification to your phone with a numeric pairing code.
The fake website displays a prompt asking you to enter that code to “confirm your login.”

Because the request looks like a standard security check, many users enter the code into their WhatsApp app without realizing they are actually authorizing a new device for the attacker.
Full Access: Once the code is entered, the attacker’s browser is linked to your account. They can now read your messages, view media, and send messages to your contacts to spread the scam further.
Why Is It So Dangerous?
- No Technical Exploit Needed: It doesn’t bypass encryption or steal passwords. It simply tricks the user into using a built-in feature to “invite” the hacker in.
- Invisible Presence: The attacker becomes a “ghost” device. Your phone continues to work normally, and unless you check your settings, you may never know someone else is reading your chats in real-time.
- Persistent Access: Closing the browser tab or the app doesn’t kick the attacker out. The link remains active until it is manually revoked.
- High Trust Factor: Since the initial message comes from a friend or family member, users are far less likely to suspect a scam.
What Attackers Can Do
Once linked, an attacker has the same power as you do on WhatsApp Web:
- Data Theft: They can download your entire chat history, private photos, and sensitive documents.
- Impersonation: They can send messages to your boss, family, or groups to ask for money or distribute malware.
- Social Mapping: By watching your interactions, they can learn your habits and relationships for more targeted future attacks (like deepfake voice scams).
How to Protect Yourself
To defend against GhostPairing and similar attacks, follow these steps:
Check Your Linked Devices: Open WhatsApp → Settings → Linked Devices. If you see any device you don’t recognize (e.g., “Google Chrome on Windows” when you don’t use it), tap it and select Log Out immediately.
Verification Codes: Never enter a pairing code into your WhatsApp app unless you are the one currently trying to log in to WhatsApp on a computer. If a website asks you to “verify” by entering a code into your app, it is a scam.
Enable Two-Step Verification: While GhostPairing exploits the linking flow, having a PIN on your account adds an extra layer of security against total account takeovers.
Verify via Other Channels: If a friend sends a suspicious link about “finding your photo,” call them or text them on a different platform to confirm if they actually sent it.
Conclusion
The GhostPairing attack is a reminder that the strongest link in security is often the human one. By masquerading as a routine Facebook login, attackers are turning WhatsApp’s convenience features against its users. Regular “hygiene checks” of your linked devices are now a necessary part of staying safe on the platform.
FAQs
Q.1 How do I know if I’ve been targeted by a GhostPairing attack?
Ans. Check your WhatsApp ‘Linked Devices’ settings. If you see an unrecognized browser or device session, your account may have been compromised via GhostPairing.
Q.2. How can I stop a GhostPairing attack?
Ans. Check your WhatsApp ‘Linked Devices’ settings. If you see an unrecognized browser or device session, your account may have been compromised via GhostPairing.