Home » Technology » your WhatsApp can be hacked with your voicemail

your WhatsApp can be hacked with your voicemail

Throughout the day we send dozens of messages through apps like WhatsApp and Telegram, we have private conversations and we share a lot of sensitive information. Therefore, we have to be very careful with this data and knowing the dangers we face can be of great help.

As we read in the blog A computer scientist on the side of evil, of the known pirate Chema Alonso, the criminals found Rather curious methods to steal accounts of apps like WhatsApp. One of them is not very complicated and is carried out with the help of your voice mail.

Basic and essential WhatsApp tips

Be careful with your voicemail

The first time we download WhatsApp to a device, we have the option to recover our account. We have all gone through this process, we add our phone number and we can verify it with a code that comes by SMS. However, there is also the possibility of receiving a call in which the code will be dictated. It is the door that some use the Pirates steal whatsapp accounts.

The method is quite simple, and they can use it whether or not they have the victim’s cell phone. Here are the steps that the attacker would follow without having possession of the victim’s mobile:

  • Enter the victim’s phone number to verify the account. An SMS will be sent to your device.
  • When not using the code and after 1 minute, select the option to verify via a call.
  • If the victim does not take the call, the WhatsApp system will leave a message with the code on their voicemail.

WhatsApp hack with voicemail

WhatsApp hack with voicemail

The criminal can access this message without having his cell phone at hand, there is a real danger. When you try to access another device’s voicemail box, a PIN code is asked, a 4-digit code which, in general, is not too complicated. If you use statistics you find out they would already have our WhatsApp account.

In a case where our smartphone was in the hands of the attacker, the process would be much easier. After entering the phone number, you just have to wait for the call – you don’t have to unlock a mobile to answer a call – and write down the code.

The same does not happen with Telegram

Account verification in Telegram

Account verification in Telegram

Telegram has a similar, but not identical process. This will give us the choice between two ways: take the verification code in an SMS or, after a few minutes, receive a call on the number we want to retrieve with the verification code.

Then? Where is the difference? In this case, no message is left in the voicemail, avoiding theft if the pirate does not have the victim’s smartphone in their possession. A small change in the process that helps protect our account.

This may interest you: How to automatically translate your WhatsApp messages

45seconds is a new medium, do not hesitate to share our article on social networks to give us a solid boost. ????

  • AIPHONE Built-in stainless steel audio panel 2 BP IP / SIP with pictorial speech synthesis and magnetic loop IXSSA2L – AIPHONE 200946

    IXSSA2L recessed audio turntable Stainless steel front, recessed mounting. Possibility to connect a remote camera ONVIF profile S protocol. Call up to 20 stations simultaneously. Audio recording on micro SD card (not supplied) which can be played on PC. Audio and video recording on micro SD card (no

  • AIPHONE Built-in stainless steel audio panel 2 BP IP / SIP with pictorial speech synthesis and magnetic loop IXSSA2L – AIPHONE 200946

    IXSSA2L recessed audio turntable Stainless steel front, recessed mounting. Possibility to connect a remote camera ONVIF profile S protocol. Call up to 20 stations simultaneously. Audio recording on micro SD card (not supplied) which can be played on PC. Audio and video recording on micr card

  • AIPHONE Built-in stainless steel audio panel 1 BP IP / SIP with pictorial speech synthesis and IXSSAL magnetic loop – AIPHONE 200945

    IXSSAL recessed audio panel Stainless steel front, recessed mounting. Possibility to connect a remote camera ONVIF profile S protocol. Vandal resistant. Audio recording on micro SD card (not supplied) which can be played on PC. Audio and video recording on micro SD card (not supplied) if

– –

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.