Hackers Use MMI Code Trick To Hack WhatsApp Accounts

Share post:

Rahul Sasi, founder and CEO of CloudSEK, has revealed details of how attackers use the MMI code trick to hack users’ WhatsApp accounts.

According to Sasi, the attackers must first convince the victim to call a number that begins with a Man Machine Interface (MMI) code that the mobile phone provider has set up to enable call forwarding.

After the victim has been tricked into forwarding calls to their number, the attacker starts the WhatsApp registration process on their device. They choose the option to receive the OTP by voice call.

After receiving the OTP code, the attacker registers the victim’s WhatsApp account on their device and activates two-factor authentication. By activating 2FA, the attacker can prevent the rightful owner from regaining access.

The procedure is rigorous and has a high potential for success, as users are not familiar with the MMI codes or the mobile phone settings that disable call forwarding.

WhatsApp users are advised to activate 2FA on their account to guard against this type of attack. The two-factor authentication feature prevents malicious actors from gaining control of the account by requiring a PIN when a phone logs in to the messaging app.

The sources for this piece include an article in BleepingComputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways