A big problem popped up in WhatsApp. It left phone numbers and other bits of info for more than 3.5 billion people out in the open. Folks from the University of Vienna spotted this weak spot. They say it let bad guys peek at stuff like profile pics and short bios. WhatsApp knew about a similar issue way back in 2017. But it took them a long time to fix things. This piece looks at how it all happened. We cover the data that got loose. And we talk about what it means for everyday users around the world. It’s scary when an app so many trust has a hole like this. Reminds me of that time in 2021 when Facebook lost 500 million records to scrapers. Things like that make you double-check your privacy settings.
The Discovery of the Security Flaw
Back in 2025, a team from the University of Vienna dug into WhatsApp. They found a hole that had sat there for years. It came from the “contact discovery” part of the app. That’s the tool that lets you upload your phone book. It then tells you which friends are on WhatsApp too. Simple enough for chatting. But hackers could twist it. They scanned huge lists of phone numbers. And they figured out which ones had WhatsApp accounts.
What began as a quick way to find buddies turned into a real danger. Attackers grabbed extra info that’s out there for anyone to see. Things like profile pictures. Short status texts. Even details on the phone or linked devices. In bad cases, crooks could build a giant list of user data. That puts privacy at risk big time. The researchers called it the biggest phone number spill ever noted. They checked 63 billion possible numbers from December 2024 to April 2025. Across 245 countries. Crazy scale.
The team used a tool called libphonegen. It spits out real-looking phone numbers for testing. They ran queries through WhatsApp’s own setup. No hacks needed. Just smart poking. And they hit over 100 million checks per hour. From one server. With only five logins. That’s nuts. Normally, apps slow you down after a few tries. But here? Wide open.
How the Vulnerability Worked
The contact sync basics
WhatsApp’s contact discovery helps folks link up. You share your contacts. The app checks who’s signed up. Easy. But it missed strong guards. No good limits on how fast or how many checks you could do. Rate limiting stops big data grabs. It caps requests per minute or hour. WhatsApp had some. But they didn’t work well against bulk attacks.
Step by step exploit
Once a number showed as WhatsApp-linked, more came free. Profile photo if set to public. Status text too. Device info. Timestamps. Even public keys for the chat encryption. Private messages stayed locked. Thanks to end-to-end setup. But metadata? Wide open.
Researchers grabbed profile pics for 57% of users. Status text for 29%. In India, with 750 million numbers, only 38% hid their pics. Brazil had 206 million. 61% showed photos. That’s a lot of faces out there. They also spotted 2.9 million reused keys. Some all zeros. Maybe from fake apps. Not WhatsApp’s fault direct. But still weak.
One example: Say a scammer wants targets. They run this scan. Get numbers. Match to social media. Boom. Personal info pile. Or worse, in places like China. WhatsApp’s banned. But 2.3 million users there. Myanmar 1.6 million. Iran 59 million. Governments could hunt them easy. Reports say Muslims in China got nabbed just for having the app. This flaw? It lights them up.
The team presented this at NDSS 2026. It’s their third paper on WhatsApp weak spots. First was silent pings for tracking activity. Won a best paper at RAID 2025. Then handshake issues at USENIX WOOT. Each builds. Shows how small choices snowball.
Meta’s Response and Acknowledgment of the Issue
WhatsApp sits under Meta. They got a heads-up in 2017 from another expert. That guy, Kloeze, showed the same contact check flaw. No fix then. Fast forward to April 2025. Vienna team reaches out. At first, Meta drags feet. But they team up. Under the Bug Bounty program. That’s where companies pay for finding bugs.
Meta went public. Called it a glitch in their number-check method. Let folks pull basic public stuff. A rep thanked the researchers. Said their work spotted a new trick past old limits. By October 2025, fixes rolled out. Tighter rate limits. Used math tricks like probabilistic structures. Blocked pic and status pulls even if public. Dropped timestamps from queries. Fixed key reuse on Android.
Meta swore the research data got wiped clean. No signs bad guys used it first. And chats? Still safe. End-to-end encryption holds. No peeks at texts or calls.
But hold up. Eight years from the first warning? That’s rough. Users stayed exposed. In chats on X, folks griped. One post said, “Meta knew since 2017 and did zip?” Another joked, “My number’s been shopped since Obama.” Harsh but fair.
The Scale and Implications of the Data Leak
Huge numbers at stake
If crooks grabbed this, it’d top history’s leaks. Bigger than that 2021 Facebook scrape. 500 million records there. Here? 3.5 billion. Phone numbers. Timestamps. Pics. Bios. Encryption keys. All in one dump.
The Vienna folks said it flat out. Most massive phone and user data spill recorded. WhatsApp claims 2.8 billion monthly users. But they confirmed 3.5 billion active. Wait, what? Maybe old accounts count. Or bots. Either way, near everyone.
Real world hits
Identity theft jumps first. Scammers call from “your bank.” Use your pic for deepfakes. Targeted phishing. “Hey, saw your status – click this.” Or spam floods. India banned 6.8 million scam accounts in August 2025 alone. This data? Rocket fuel.
Worse for at-risk groups. In banned spots, it’s a snitch list. Link numbers to IDs. Track dissidents. Military too. Researchers tied some to officials. One X thread vented, “This is why VPNs and burners matter in rough countries.”
Business side? WhatsApp Business accounts got scraped. 57% pics exposed. Could spam legit shops. Or fake ones pop up.
And keys? Reused ones weaken encryption. Not break it full. But chains attacks. Like if one device falls, others wobble.
Scale hits hard. 63 billion probes. 3.5 billion hits. From a uni server. Imagine a botnet. Or state actor. Dark web sales? Priceless. Past leaks sold for pennies per record. This? Goldmine.
The Importance of Cybersecurity Vigilance
This WhatsApp mess is a wake-up call. Big apps have holes. Even with smart teams. Meta fixed it once poked. But years of delay? Not cool. Shows why quick patches matter. And why users can’t sleep on it.
Platforms grow fast. Billions chat daily. But central setups? One flaw ripples global. Need better checks. Like hashing numbers right. But as one expert noted, hashes don’t stop brute checks. You gotta cap queries hard.
For companies, it’s simple. Hunt bugs proactive. Bug bounties help. But test at scale. Sim bad actors. Vienna team did that. With ethics. Deleted data. Shared fixes.
Users? Lock your profile. Set to contacts only. Not everyone. Use two-step verify. Watch for odd calls. And diversify apps? Maybe Signal for sensitive stuff. Less users, but tighter.
Digital world’s wild. 2025 saw Samsung spyware hits. NSO zero-days. This? Just another nudge. Keep eyes open. Trust but verify. As one prof told Wired, “Big services mean big targets.” Yeah. And we’re all in the crosshairs.
Oh, side note. While digging this, stumbled on how EU’s GDPR might fine Meta big. Past slaps were millions. This could top. US pushes too. Privacy bills bubble. Good. Forces change.
In the end, vigilance wins. Monitor. Respond fast. Build tough. That keeps trust alive. Without it, apps like WhatsApp crumble. Billions count on them. Don’t let slips erode that.

