What is the story about?
It begins, as many cyberattacks do, with something deceptively ordinary. A download link. A familiar logo. A promise of a trusted app. But for around 200 users, what looked like WhatsApp turned out to be a carefully crafted trap.
In a fresh warning that underscores the evolving sophistication of digital threats, WhatsApp has revealed that hundreds of users were tricked into installing a malicious version of its messaging app.
The attack, believed to have targeted individuals primarily in Italy, relied not on technical exploits but on human vulnerability, using social engineering tactics to bypass suspicion.
The company has pointed fingers at an Italian surveillance firm, SIO, which allegedly developed the spyware through its subsidiary ASIGINT. While the scale of the attack appears limited, its implications are far broader, highlighting how even trusted platforms can be mimicked to devastating effect.
According to WhatsApp’s parent company Meta, the victims were not randomly selected. Instead, the attack was a “social engineering attempt targeting a limited number of users,” designed to persuade them to install a malicious app masquerading as WhatsApp.
“Our security team identified around 200 users, most of them in Italy, who we believe may have downloaded this unofficial and malicious client. We logged them out and warned them about the privacy and security risks,” Meta said in a statement.
The company added that the attackers likely aimed to gain access to users’ devices by exploiting trust in the WhatsApp brand. Once installed, the fake application reportedly enabled external actors to access sensitive data stored on the victims’ phones.
Notably, Meta has not disclosed what specific data may have been compromised or the identities of those affected. However, the company has confirmed it is taking legal steps, including preparing a formal demand to halt any further malicious activity linked to the spyware developer.
Unlike many common malware campaigns, this attack did not rely on official app marketplaces. Instead, the malicious version of WhatsApp was distributed through third-party channels, making it harder for platform safeguards to intervene.
Victims were reportedly persuaded to download what appeared to be a legitimate version of the app, often through deceptive links or communications that mimicked official messaging. This method allowed attackers to bypass the scrutiny typically applied to apps listed on major platforms.
Once installed, the app functioned as spyware, silently granting access to data on the device. This could include messages, personal files, or other sensitive information, though exact details remain unclear.
WhatsApp spokesperson Margarita Franklin emphasised the company’s immediate response, stating, “Our priority has been protecting the users who may have been tricked into downloading this fake iOS app.”
The incident highlights a growing trend in cyber threats where attackers increasingly rely on manipulation rather than technical vulnerabilities. By exploiting user trust and brand familiarity, such campaigns can achieve high success rates despite targeting a relatively small number of individuals.
For users, the message is clear: even the most recognisable apps can be imitated. Verifying download sources, avoiding third-party links, and staying alert to unusual prompts are now essential habits in an increasingly complex digital landscape.
In a fresh warning that underscores the evolving sophistication of digital threats, WhatsApp has revealed that hundreds of users were tricked into installing a malicious version of its messaging app.
The attack, believed to have targeted individuals primarily in Italy, relied not on technical exploits but on human vulnerability, using social engineering tactics to bypass suspicion.
The company has pointed fingers at an Italian surveillance firm, SIO, which allegedly developed the spyware through its subsidiary ASIGINT. While the scale of the attack appears limited, its implications are far broader, highlighting how even trusted platforms can be mimicked to devastating effect.
A targeted attack
According to WhatsApp’s parent company Meta, the victims were not randomly selected. Instead, the attack was a “social engineering attempt targeting a limited number of users,” designed to persuade them to install a malicious app masquerading as WhatsApp.
“Our security team identified around 200 users, most of them in Italy, who we believe may have downloaded this unofficial and malicious client. We logged them out and warned them about the privacy and security risks,” Meta said in a statement.
The company added that the attackers likely aimed to gain access to users’ devices by exploiting trust in the WhatsApp brand. Once installed, the fake application reportedly enabled external actors to access sensitive data stored on the victims’ phones.
Notably, Meta has not disclosed what specific data may have been compromised or the identities of those affected. However, the company has confirmed it is taking legal steps, including preparing a formal demand to halt any further malicious activity linked to the spyware developer.
How the fake app spread
Unlike many common malware campaigns, this attack did not rely on official app marketplaces. Instead, the malicious version of WhatsApp was distributed through third-party channels, making it harder for platform safeguards to intervene.
Victims were reportedly persuaded to download what appeared to be a legitimate version of the app, often through deceptive links or communications that mimicked official messaging. This method allowed attackers to bypass the scrutiny typically applied to apps listed on major platforms.
Once installed, the app functioned as spyware, silently granting access to data on the device. This could include messages, personal files, or other sensitive information, though exact details remain unclear.
WhatsApp spokesperson Margarita Franklin emphasised the company’s immediate response, stating, “Our priority has been protecting the users who may have been tricked into downloading this fake iOS app.”
The incident highlights a growing trend in cyber threats where attackers increasingly rely on manipulation rather than technical vulnerabilities. By exploiting user trust and brand familiarity, such campaigns can achieve high success rates despite targeting a relatively small number of individuals.
For users, the message is clear: even the most recognisable apps can be imitated. Verifying download sources, avoiding third-party links, and staying alert to unusual prompts are now essential habits in an increasingly complex digital landscape.














