{"id":9797,"date":"2026-04-02T10:01:09","date_gmt":"2026-04-02T10:01:09","guid":{"rendered":"https:\/\/villpress.com\/?p=9797"},"modified":"2026-04-02T10:01:18","modified_gmt":"2026-04-02T10:01:18","slug":"whatsapp-notifies-hundreds-of-users","status":"publish","type":"post","link":"https:\/\/villpress.com\/fr\/whatsapp-notifies-hundreds-of-users\/","title":{"rendered":"WhatsApp Notifies Hundreds of Users Targeted by Fake App from Government Spyware Maker"},"content":{"rendered":"<p>WhatsApp has sent urgent alerts to hundreds of users worldwide after discovering they installed a malicious fake version of the messaging app created by a known government spyware vendor.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"312\" height=\"680\" src=\"https:\/\/villpress.com\/wp-content\/uploads\/2026\/04\/WhatsApp_spyware_Notification_English.webp\" alt=\"\" class=\"wp-image-9799\" title=\"\"><figcaption class=\"wp-element-caption\">A screenshot of the notification Whatsapp sent to users warning them to download the official app<\/figcaption><\/figure>\n\n\n\n<p>The alerts warned recipients that their devices were likely compromised by sophisticated spyware capable of stealing messages, contacts, photos, and location data. The fake app was distributed through phishing links and third-party websites mimicking the official WhatsApp download page.<\/p>\n\n\n\n<p>According to security researchers, the malicious app was developed by a company with ties to government surveillance programs. Once installed, it could bypass standard security checks and gain deep access to the victim\u2019s phone, including encrypted chats and two-factor authentication codes.<\/p>\n\n\n\n<p>WhatsApp\u2019s Threat Intelligence team acted quickly after detecting the campaign, notifying affected users directly through in-app messages and recommending immediate actions: uninstall the fake app, run a full device scan, change passwords, and enable two-factor authentication where possible.<\/p>\n\n\n\n<p>This incident highlights the growing risk of state-linked actors using trojanized apps to target journalists, activists, opposition figures, and business leaders. The use of a fake WhatsApp app is particularly effective because the legitimate app is one of the most widely used communication tools globally, especially in regions with high mobile penetration like Africa, Latin America, and parts of Asia.<\/p>\n\n\n\n<p>Meta, WhatsApp\u2019s parent company, has not named the spyware maker publicly but confirmed the campaign involved \u201cgovernment-sponsored\u201d actors. The company continues to monitor similar threats and has strengthened detection mechanisms for fake app distribution.<\/p>\n\n\n\n<p>For affected users, the key message from WhatsApp is straightforward: treat any WhatsApp download from outside official app stores with extreme caution and act immediately on security notifications.<\/p>\n\n\n\n<p>The episode serves as a timely reminder that even popular, end-to-end encrypted apps are not immune to advanced persistent threats when users are tricked into installing compromised versions.<\/p>","protected":false},"excerpt":{"rendered":"<p>WhatsApp has sent urgent alerts to hundreds of users worldwide after discovering they installed a malicious fake version of the messaging app created by a known government spyware vendor. The alerts warned recipients that their devices were likely compromised by sophisticated spyware capable of stealing messages, contacts, photos, and location data. The fake app was [&hellip;]<\/p>\n","protected":false},"author":31579,"featured_media":9798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[170],"tags":[1215],"ppma_author":[452],"class_list":{"0":"post-9797","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apps","8":"tag-whatsapp"},"authors":[{"term_id":452,"user_id":31579,"is_guest":0,"slug":"estherspeaks","display_name":"Esther Speaks","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/cdcaf0f94087bbfcad372d974a1a697382dc93112457104ff6535cf4984ea4de?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/posts\/9797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/users\/31579"}],"replies":[{"embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/comments?post=9797"}],"version-history":[{"count":1,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/posts\/9797\/revisions"}],"predecessor-version":[{"id":9800,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/posts\/9797\/revisions\/9800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/media\/9798"}],"wp:attachment":[{"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/media?parent=9797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/categories?post=9797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/tags?post=9797"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/villpress.com\/fr\/wp-json\/wp\/v2\/ppma_author?post=9797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}