Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
Home/CyberSecurity News/WhatsApp Vulnerabilities Leak User Metadata & OS Info
CyberSecurity News

WhatsApp Vulnerabilities Leak User Metadata & OS Info

WhatsApp’s multi-device encryption protocol has long leaked user metadata. This vulnerability allowed attackers to fingerprint device operating systems, directly aiding in targeted malware...

Jennifer sherman
Jennifer sherman
January 5, 2026 2 Min Read
67 0

WhatsApp’s multi-device encryption protocol has long leaked user metadata. This vulnerability allowed attackers to fingerprint device operating systems, directly aiding in targeted malware delivery. Though recent research confirms Meta has implemented partial fixes, transparency issues persist.

Meta’s WhatsApp, with over 3 billion monthly active users, uses end-to-end encryption (E2EE) for message security; however, its multi-device feature reveals device information.

In this setup, senders establish separate sessions with each recipient device, using unique encryption keys generated on the device rather than on servers.

Implementation differences in key IDs, like Signed Pre-Key (Signed PK) and One-Time Pre-Key (OTPK), reveal whether a device runs Android or iOS, which is crucial for reconnaissance in cyber kill chains.​

Attackers exploit this passively by querying WhatsApp servers for session keys without user interaction, identifying OS types to deploy precise exploits and Android malware to Android devices, avoiding iOS or alerting victims.​

WhatsApp device fingerprinting
WhatsApp device fingerprinting (Source: TalBeerySec)

Early 2024 research by Tal A. Be’ery at WOOT’24 exposed leaks of device count, types, and identities via per-device sessions based on Signal’s protocol.

Later that year, attackers pinpointed specific devices for exploits. In 2025, Gabriel Karl Gegenhuber et al. at WOOT’25 detailed OS fingerprinting: Android Signed PK IDs increment slowly from 0 monthly, while iOS patterns differ sharply.​

Tal A. Be’ery verified this with custom tools, confirming attackers chain these leaks: detect OS, deliver OS-specific payloads undetected.​

WhatsApp’s Silent Fix

Recently, WhatsApp changed the assignment of Android Signed PK IDs to random values across the 24-bit range, thwarting that vector. This change, detected via monitoring tools, marks a shift from Meta’s prior stance, which dismissed it as non-actionable.​

WhatsApp device fingerprinting
WhatsApp device fingerprinting (Source: TalBeerySec)

However, OTPK remains distinguishable: iOS starts low and increments every few days, versus Android’s full random span. Tools adapted post-fix still reliably detect the OS.​

This enables advanced persistent threats (APTs) to use WhatsApp as a vector for malware, as seen in the Paragon spyware cases. No user notifications occur during queries, thereby preserving stealth.​

Critics note that the rollout lacked researcher alerts, bug bounties, or CVE assignment, unlike a similar issue in which a bounty was paid without a CVE. CVEs document issues via CVSS scores, not shame; such omissions hinder tracking.​

While fixes evolve, full randomization across platforms and CVE transparency would better protect billions, enabling community collaboration. Users should limit linked devices and monitor activity amid ongoing risks.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Gmail Ends POP3 Mail Fetching for External Email Accounts

Next Post

GravityRAT Remote Access Malware Attacks Windows, Android, macOS

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us