Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

Microsoft’s Agent 365 Tries to Be the AI Bot Boss

18 November 2025

Yuji Horii On Making Dragon Quest Games: ‘I Do Think I Will Work On It Until I Die’

18 November 2025

This Quest 3S Bundle Is $50 Off and Includes a Game and Gift Card

18 November 2025

The Best Extreme Alarm Clocks

18 November 2025

Gemini 3 Is Here—and Google Says It Will Make Search Smarter

18 November 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
Tech News

A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

By technologistmag.com18 November 20253 Mins Read
Share
Facebook Twitter Reddit Telegram Pinterest Email

WhatsApp’s mass adoption stems in part from how easy it is to find a new contact on the messaging platform: Add someone’s phone number, and WhatsApp instantly shows whether they’re on the service, and often their profile picture and name, too.

Repeat that same trick a few billion times with every possible phone number, it turns out, and the same feature can also serve as a convenient way to obtain the cell number of virtually every WhatsApp user on earth—along with, in many cases, profile photos and text that identifies each of those users. The result is a sprawling exposure of personal information for a significant fraction of the world population.

One group of Austrian researchers have now shown that they were able to use that simple method of checking every possible number in WhatsApp’s contact discovery to extract 3.5 billion users’ phone numbers from the messaging service. For about 57 percent of those users, they also found that they could access their profile photos, and for another 29 percent, the text on their profiles. Despite a previous warning about WhatsApp’s exposure of this data from a different researcher in 2017, they say, the service’s parent company, Meta, still failed to limit the speed or number of contact discovery requests the researchers could make by interacting with WhatsApp’s browser-based app, allowing them to check roughly a hundred million numbers an hour.

The result would be “the largest data leak in history, had it not been collated as part of a responsibly conducted research study,” as the researchers describe it in a paper documenting their findings.

“To the best of our knowledge, this marks the most extensive exposure of phone numbers and related user data ever documented,” says Aljosha Judmayer, one of the researchers at the University of Vienna who worked on the study.

The researchers say they warned Meta about their findings in April and deleted their copy of the 3.5 billion phone numbers. By October, the company had fixed the enumeration problem by enacting a stricter “rate-limiting” measure that prevents the mass-scale contact discovery method the researchers used. But until then, the data exposure could have also been exploited by anyone else using the same scraping technique, adds Max Günther, another researcher from the university who cowrote the paper. “If this could be retrieved by us super easily, others could have also done the same,” he says.

In a statement to WIRED, Meta thanked the researchers, who reported their discovery through Meta’s “bug bounty” system, and described the exposed data as “basic publicly available information,” since profile photos and text weren’t exposed for users who opted to make it private. “We had already been working on industry-leading anti-scraping systems, and this study was instrumental in stress-testing and confirming the immediate efficacy of these new defenses,” writes Nitin Gupta, vice president of engineering at WhatsApp. Gupta adds, “We have found no evidence of malicious actors abusing this vector. As a reminder, user messages remained private and secure thanks to WhatsApp’s default end-to-end encryption, and no non-public data was accessible to the researchers.”

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleYou Don’t Need a Home Cocktail Machine. You Might Want One Anyway
Next Article Best Early Black Friday Mattress Deals 2025

Related Articles

Microsoft’s Agent 365 Tries to Be the AI Bot Boss

18 November 2025

This Quest 3S Bundle Is $50 Off and Includes a Game and Gift Card

18 November 2025

The Best Extreme Alarm Clocks

18 November 2025

Gemini 3 Is Here—and Google Says It Will Make Search Smarter

18 November 2025

The Best Binoculars to Zoom In on Real Life

18 November 2025

Best Early Black Friday Mattress Deals 2025

18 November 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss

Yuji Horii On Making Dragon Quest Games: ‘I Do Think I Will Work On It Until I Die’

By technologistmag.com18 November 2025

Dragon Quest VII Reimagined is gracing the latest cover of Game Informer, and it’s somehow…

This Quest 3S Bundle Is $50 Off and Includes a Game and Gift Card

18 November 2025

The Best Extreme Alarm Clocks

18 November 2025

Gemini 3 Is Here—and Google Says It Will Make Search Smarter

18 November 2025

Analogue 3D, Which Can Play Any N64 Cartridge, Continues The Company’s Stellar Reputation

18 November 2025
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2025 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.