In recent years, the scam of a son in trouble has become increasingly common on mobile phones in Spain. The scam usually starts with a message asking for money after claiming to have lost their cell phone and requesting help from a new number. However, this scam is not limited to just cell phones and has also been targeting the victim’s WhatsApp account.
According to a study by Kaspersky, almost 90% of cyberattacks target WhatsApp, which is the most popular messaging application in the world. Attackers target WhatsApp because gaining access to an account provides them with a credible connection to the victim’s friends, family, and colleagues. This credibility can be used to request money, personal data, or photos that can then be used for extortion.
One of the ways attackers gain access to a WhatsApp account is through phishing attacks. They may send a message asking for login credentials or pose as a trusted contact and trick victims into providing verification codes. Once they have control of an account, they can use it to request money or personal information from the victim’s contacts or even use voice synthesizers to imitate the owner’s voice in audio messages.
WhatsApp has implemented two-factor verification systems to protect accounts against attacks like these. However, attackers may try to trick victims into providing verification codes by posing as trusted contacts or exploiting vulnerabilities in human behavior. It is crucial for users to stay vigilant and take additional security measures like being cautious when sharing verification codes, avoiding clicking on suspicious links or downloading unknown files, and keeping software and security systems up-to-date. By doing so, users can reduce their risk of falling victim to these types of scams targeting their WhatsApp accounts.
In conclusion, it is essential for individuals who use WhatsApp regularly to take extra precautions when using this platform. Cybercriminals are becoming more sophisticated in their tactics and are exploiting vulnerabilities in human behavior and social engineering techniques