Skip to content
LNU News
  • Economy
  • Geopolitics
  • Health
  • Society
  • Technology
What is GhostPairing and how it can endanger your WhatsApp account

What is GhostPairing and how it can endanger your WhatsApp account

January 7, 2026

A group of researchers from the cybersecurity company Gen Digital has identified a sophisticated new social engineering technique that has the potential to endanger anyone with a WhatsApp account. All without violating the platform’s encryption protocols, but by exploiting some functions integrated into WhatsApp that allow GhostPairing to be perpetrated, as the researchers have defined the technique. By exploiting the “Connected Devices” option, cybercriminals silently insert an external observer into our private conversations. This becomes possible by inducing the victim to authorize a new device (usually the attacker’s browser) by making him believe he is completing a trivial verification procedure to view multimedia content on an external platform, often disguised as Facebook.

The danger of this attack lies in the invisibility enjoyed by the cyber criminal. The latter, in fact, does not prevent the user from continuing to use their phone to receive and send messages and, in this way, they can read the victim’s chat history, listen to voice notes, send messages impersonating the account owner and transforming the compromised profile into a bridge with which they can potentially spread the infection to all the contacts in the address book. Let’s see in more detail how GhostPairing works on WhatsApp and how to defend yourself.

How WhatsApp GhostPairing works

It usually starts with a notification that appears harmless, coming from a contact in our address book, a friend, a family member or a colleague who, unbeknownst to him, whose WhatsApp account has already been compromised. The text is short, colloquial and appeals to curiosity, with sentences like «Hey, I just found your photo!» followed by a hyperlink that takes you to an address, usually of this type:

  • photobox.life
  • postsphoto.life
  • yourphoto.life
  • photopost.live
  • yourphoto.world
  • top-foto.life
  • fotoface.top

The origin of a message from a contact already present in the address book (rather than from an unknown number), the absence of gross grammatical errors and the invitation to open the link to see a photo of oneself, lowers defenses and can potentially induce the person receiving the message to carry out the proposed action driven by the curiosity that arises from the message received. Too bad that, by clicking on the link in question, you are not directed to a real social network, but to a web page that acts as bait and which faithfully replicates the graphic interface of Facebook, using its colors, logos and layout to generate a sense of familiarity and security in those who visit it. This fraudulent page warns us that in order to view the promised image, you must complete identity verification. It is at this point that the GhostPairing trap is triggered: the site is not trying to steal Facebook credentials, but is starting the procedure to connect a new device to our WhatsApp account in the background.

The fake web page that imitates Facebook and is shown after clicking on the link received via WhatsApp. Credit: Gen Digital.

The technical mechanism on which this scam is based takes advantage of the option that allows you to associate WhatsApp Web or Desktop not only via the classic QR Code, but also by entering an alphanumeric code associated with your phone number. In the vast majority of cases, attackers prefer this second route because it can be performed entirely from the victim’s smartphone, without the need to frame external screens, making the process much more fluid and credible. Everything happens in five phases:

  1. The victim provides his mobile number on the fake Facebook page.
  2. The page delivers the collected number to WhatsApp’s legitimate “Connect a Device” feature.
  3. WhatsApp at this point generates an association code which should only be visible to the account owner.
  4. The site set up by the attacker takes that code and shows it to the victim with a text that suggests «enter it in WhatsApp to confirm access and see the photo».
  5. At this point, the victim opens WhatsApp, sees the pairing request and enters the code, thinking they are completing a legitimate security check.

Once the connection is established (or pairing), the intruder acts as a “ghost” device (in English ghosthence the name GhostPairing). From this moment he has real-time access to everything that passes through his victim’s account: he can read incoming and past messages, download photos and videos, listen to voice messages and steal sensitive information. Even more serious is the possibility of sending messages in the name of his victim; this allows the scam to self-propagate like wildfire by exploiting the trust that contacts place in the user, creating a “snowball” effect that is difficult to stop.

How to defend yourself from WhatsApp GhostPairing

To defend yourself from the risk of WhatsApp GhostPairing, it is essential to remember a key aspect highlighted by security researchers at Gen Digital:

(You should) treat any request to scan a WhatsApp QR code or enter a numeric code from a web page as suspicious. Connecting to WhatsApp should happen from within the app and in response to a deliberate action, not because an external site tells you it’s necessary to view a file. (…) Enabling two-step verification in WhatsApp adds an additional obstacle to other types of account abuse. It’s not a complete solution, but it reduces the range of actions attackers can take once inside.

To make sure that your WhatsApp account is not being spied on via the GhostPairing technique, also do this check.

  1. Open the WhatsApp app and go to the Settings > Connected devices section.
  2. Carefully analyze the list of devices connected to your account.
  3. If you notice a suspicious connection, tap the name of the device you want to remove and select Exit twice in a row.
How to delete any suspicious devices from your WhatsApp account.

Categories Technology
Almost all of us make mistakes when using “rather than”: how it is used and what it means
Who really is the Befana: the true story of the Italian tradition on the night of January 6th
Recent posts
5 inventions that we owe to the First World War and that we still use today
5 inventions that we owe to the First World War and that we still use today
Google Live Search is not (yet) available in Italy: why some users have it and others don't
Google Live Search is not (yet) available in Italy: why some users have it and others don’t
Come funziona il deposito titoli di Poste Italiane e quanto costa davvero
How the Poste Italiane securities deposit works and how much it really costs
BPER, JpMorgan Chase ha una partecipazione potenziale del 10%
JpMorgan brings potential stake above 10%
Farmaci anti-obesità, la sfida si accende: su Lancet il confronto tra orforglipron e semaglutide
in Lancet the comparison between orforglipron and semaglutide
South Pars hit in Iran, what it is and why the largest gas field in the world is strategic
South Pars hit in Iran, what it is and why the largest gas field in the world is strategic
Borse, settimana dominata dal rally del petrolio e dalla crisi di Hormuz
Middle East crisis pushes oil
Spread Btp-Bund, altro balzo a 84 punti base: piazzati 6 miliardi all’asta dei Btp
6 billion placed at the BTP auction
Giornata Europea della Logopedia, il ruolo dell’IA per le difficoltà di linguaggio e comunicazione
European Speech Therapy Day, the role of AI for language and communication difficulties
How to understand which apps consume the most battery on your smartphone: advice for Android and iPhone
How to understand which apps consume the most battery on your smartphone: advice for Android and iPhone
© 2026 LNU News - [email protected]
About us Contact