Hackers Use MMI Code Trick To Hack WhatsApp Accounts

Share post:

Rahul Sasi, founder and CEO of CloudSEK, has revealed details of how attackers use the MMI code trick to hack users’ WhatsApp accounts.

According to Sasi, the attackers must first convince the victim to call a number that begins with a Man Machine Interface (MMI) code that the mobile phone provider has set up to enable call forwarding.

After the victim has been tricked into forwarding calls to their number, the attacker starts the WhatsApp registration process on their device. They choose the option to receive the OTP by voice call.

After receiving the OTP code, the attacker registers the victim’s WhatsApp account on their device and activates two-factor authentication. By activating 2FA, the attacker can prevent the rightful owner from regaining access.

The procedure is rigorous and has a high potential for success, as users are not familiar with the MMI codes or the mobile phone settings that disable call forwarding.

WhatsApp users are advised to activate 2FA on their account to guard against this type of attack. The two-factor authentication feature prevents malicious actors from gaining control of the account by requiring a PIN when a phone logs in to the messaging app.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways