Home » Technology » WhatsApp Vulnerability: 3.5 Billion Accounts Exposed

WhatsApp Vulnerability: 3.5 Billion Accounts Exposed

by Rachel Kim – Technology Editor

WhatsApp Vulnerability Exposed Billions of User Profiles to Scraping

Vienna, Austria – A team of researchers at the University of Vienna discovered and exploited a significant flaw in WhatsAppS architecture, allowing the enumeration of⁣ 3.5 billion user profiles. Meta,whatsapp’s parent company,has since implemented patches to address the vulnerability,which allowed for the mass​ collection of data despite existing‌ rate limits.

the researchers demonstrated the⁣ ability to query WhatsApp servers with phone numbers to determine account availability – a necessary function for legitimate users seeking ⁣to connect. However,they found they ​could probe over 100 million numbers per hour without triggering blocking mechanisms.

“This architecture inherently enables phone number enumeration, as the service must allow legitimate users to query ⁣contact⁢ availability. While rate limiting ‌is a standard defense ⁣against⁤ abuse,we revisit the problem and show that WhatsApp remains highly vulnerable to enumeration at scale,” the researchers stated in their published report. “In our study,we were able to probe over ⁣a ​hundred ​million phone numbers per‌ hour without encountering blocking ⁣or effective ⁢rate limiting.”

The team‍ developed a method ⁣to generate plausible mobile numbers ‍across ⁢245 countries,‌ ultimately analyzing 3.5 billion WhatsApp accounts. This data included phone numbers, timestamps, profile pictures, “about” texts, and end-to-end ⁣encryption (E2EE) public keys – creating a massive dataset for ethical study.⁤

Notably,the analysis ​revealed that approximately half of the 500 million phone numbers exposed in the 2021 Facebook data scraping remain active on ⁣WhatsApp,highlighting the long-term consequences ​of data ⁢breaches. ⁣The research also uncovered active accounts in regions where WhatsApp is officially banned (China, Myanmar, north Korea,‌ Iran),⁤ suggesting the ineffectiveness​ of⁢ those restrictions. Further analysis⁢ of encryption keys⁢ revealed widespread reuse and potential security flaws, including instances of ‌US numbers utilizing‌ an all-zero private key,‌ perhaps indicating compromised random‍ number generators.

Meta ⁢downplayed the severity of the issue, asserting that no messages, contacts, or private data were exposed, and that profile data was only visible if users had set their privacy⁢ settings to ⁤”everyone.” the researchers ⁤initially ⁢reported the⁣ vulnerability throughout 2024-2025, with full technical ⁤details reaching Meta in August 2025. Mitigations ‍were rolled out beginning in early ‍September,​ with further protections added in October.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.