CERT-In Warns of GhostPairing WhatsApp Account Hijack Threat

By Manisha Sahu
America News World

December 25,2025

India’s top cybersecurity agency has issued a high-severity alert warning WhatsApp users about a new and sophisticated cyberattack technique known as “GhostPairing”, which allows hackers to take complete control of accounts without needing passwords, one-time passwords (OTPs), or even SIM card swaps. The advisory, released by the Indian Computer Emergency Response Team (CERT-In), highlights growing risks for millions of users who rely on WhatsApp for personal, professional, and business communication.

Meta has been rapidly expanding the payment features available on WhatsApp. (Image: Zohaib Ahmed/The Indian Express)

According to CERT-In, the GhostPairing attack is part of an active threat campaign targeting WhatsApp users across the country. The technique exploits WhatsApp’s device-linking feature, enabling attackers to silently add their own device as a trusted companion device once a user is deceived into entering a pairing code. Once linked, cybercriminals gain unrestricted access to messages, media, and contacts in real time.

What Is GhostPairing?

GhostPairing is a social-engineering-based attack that takes advantage of WhatsApp’s multi-device functionality. WhatsApp allows users to access their chats on laptops, tablets, or browsers by linking these devices to their primary smartphone account. There is currently no strict limit on how many devices can be linked to a single account.

CERT-In explains that attackers manipulate this process by tricking victims into entering a legitimate-looking pairing code. “In a nutshell, the GhostPairing attack tricks users into granting an attacker’s browser access as an additional trusted and hidden device,” the advisory states.

What makes GhostPairing particularly dangerous is that it bypasses traditional security red flags. There is no SIM swap, no password compromise, and often no immediate sign that the account has been hijacked.

How the Attack Works

CERT-In outlined a step-by-step method used by cybercriminals to execute the GhostPairing attack:

Victims receive a message from what appears to be a trusted contact, often reading something like, “Hi, check this photo.”

The message includes a malicious link with a preview resembling a Facebook post or image viewer.

Clicking the link redirects the victim to a fake webpage that prompts them to “verify” their identity to view the content.

The page asks for the victim’s phone number and then displays a pairing code.

Unknowingly, the victim enters this code, which links the attacker’s device to their WhatsApp account.

By following these seemingly harmless steps, users end up granting hackers full access to their WhatsApp accounts. Once the attacker’s device is paired, they can read past messages, monitor conversations in real time, download photos and videos, listen to voice notes, and even impersonate the victim by messaging their contacts and groups.

Why CERT-In Is Concerned

CERT-In assigned a ‘High’ severity rating to this threat, emphasizing its potential for large-scale misuse. WhatsApp accounts are often deeply integrated into users’ personal lives, workplaces, and financial activities. Hijacked accounts can be used to spread scams, steal sensitive information, extort money, or conduct social engineering attacks against friends, family, and colleagues.

The advisory comes at a time when India is witnessing a surge in digital fraud and messaging app-based scams. In October, the Indian Cybercrime Coordination Centre (I4C) under the Ministry of Home Affairs flagged a transnational crime pattern where scammers use ads on Facebook and Instagram to lure victims into linking their WhatsApp accounts to malicious platforms.

Link to SIM-Binding Directive

The GhostPairing warning also follows a major policy move by the Department of Telecommunications (DoT). Last month, the DoT directed messaging platforms such as WhatsApp, Signal, and Telegram to implement continuous SIM binding for user accounts over the coming months.

Under this directive, users will only be able to access messaging apps on devices that contain the active SIM linked to their account. Companion devices like WhatsApp Web will be logged out every six hours, requiring users to re-link them using QR codes.

The government believes this measure will reduce account hijacking and fraud. However, the directive has sparked criticism from digital rights advocates and legal experts, who argue that continuous SIM binding could compromise user privacy and make it difficult for professionals who rely on multiple devices.

Cybersecurity experts have also warned that SIM binding may face technical challenges and may not fully eliminate threats like GhostPairing, which rely more on user deception than technical loopholes.

Impact on Users and Organisations

Once attackers gain access through GhostPairing, the consequences can be severe. Hackers can pose as victims to request money, spread malware links, or collect sensitive personal and business information. In organisational settings, compromised WhatsApp accounts can expose confidential communications and damage reputations.

Businesses that use WhatsApp for customer communication are especially vulnerable. A single hijacked account can lead to data breaches, phishing campaigns, and loss of customer trust.

CERT-In’s Safety Recommendations

To mitigate the risks posed by GhostPairing and similar attacks, CERT-In has issued a set of clear guidelines for both individual users and organisations.

For individual users:

Avoid clicking on suspicious links, even if they come from known contacts.

Never enter your phone number or verification codes on external websites claiming to be WhatsApp or Facebook.

Regularly check the “Linked Devices” section in WhatsApp by going to Settings > Linked Devices.

Immediately log out of any device you do not recognise.

For organisations using WhatsApp:

Conduct regular security awareness training focused on messaging app threats.

Implement mobile device management (MDM) systems where applicable.

Monitor for phishing attempts and social engineering indicators.

Establish rapid response protocols to detect and address account compromises.

A Growing Cyber Threat Landscape

The GhostPairing campaign highlights a broader shift in cybercrime tactics, where attackers increasingly rely on psychological manipulation rather than technical exploits. By exploiting trust between contacts and familiar user interfaces, cybercriminals can bypass even the most cautious users.

As messaging platforms continue to expand features such as payments, cloud syncing, and multi-device access, the attack surface also grows. Security experts stress that user awareness remains the strongest line of defense.

What Lies Ahead

CERT-In’s advisory serves as a timely reminder that convenience often comes with security trade-offs. While WhatsApp’s multi-device functionality offers flexibility, it also creates new opportunities for abuse if users are not vigilant.

With regulators, tech companies, and users all grappling with rising cyber threats, experts say a combination of stronger platform safeguards, clearer policies, and informed user behavior is essential.

For now, CERT-In urges WhatsApp users across India to stay alert, regularly review linked devices, and think twice before clicking on unsolicited links — even during routine conversations. In the evolving digital battlefield, awareness may be the most powerful security tool of all.


Discover more from AMERICA NEWS WORLD

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from AMERICA NEWS WORLD

Subscribe now to keep reading and get access to the full archive.

Continue reading