A new study from the University of Vienna confirmed something every US WhatsApp user hoped would never happen. Criminals can now identify which phone numbers are actively registered on WhatsApp and match them with public profile photos and About statuses. That’s 137 million confirmed US accounts suddenly mapped, labeled and ready for exploitation.
And when 44 percent of those accounts show a public profile photo and 33 percent show a public About text, the data becomes a goldmine for scammers. A valid number plus a face plus a hint of personal detail is all a criminal needs to launch sophisticated social engineering attacks.
Below is what this means for American users today.
In a Nutshell:
• 137 million US WhatsApp numbers were confirmed as active
• 44 percent showed public profile photos and 33 percent had public About texts
• This data fuels SIM swapping, impersonation scams, and targeted phishing
• It also enables political micro-targeting and surveillance
• US users should secure WhatsApp, lock SIM permissions, and hide public profile info
SIM swapping is already a billion-dollar problem in the US. This new trove of confirmed phone numbers gives criminals a frightening head start.
A scammer only needs two things to impersonate you when calling AT&T, T Mobile, or Verizon. A working phone number and a convincing personal detail.
The leak provides both.
With a number confirmed as active on WhatsApp, plus a profile photo and a short About text revealing clues like a first name or city, criminals sound more credible to customer service agents. Once they convince a carrier to transfer your number to their SIM card, they control your calls and texts. That includes SMS based banking codes, crypto account 2FA, and password resets.
In minutes, attackers can drain accounts and lock victims out completely.
Because scammers don’t need to guess anymore. They already know your number is real.
By copying your profile picture and name and contacting your friends with “Hey it’s me, I changed numbers” messages, attackers can launch incredibly convincing WhatsApp impersonation scams.
Example of a Scam Message
Requests for urgent help, quick money transfers, or “I need your verification code” become far more believable when they come from a familiar face.
And it gets worse. US phone numbers in this leak can be cross-matched with old breaches like the 2021 Facebook scraping incident. A scammer might combine your WhatsApp photo with your full name, email, or hometown, then shift channels and attack you through SMS or email with a highly personalized phishing attempt.
Unfortunately yes. In a US election year, confirmed active numbers become a powerful targeting tool.
Political groups or foreign actors can create segmented databases of millions of verified WhatsApp users. They can push tailored misinformation directly into private chats, especially in swing states. WhatsApp’s viral forwarding structure makes this extremely effective at scale.
Even agencies monitoring activists or journalists can use these confirmed numbers to identify if a specific person uses WhatsApp and even which operating system they use. Metadata is tiny but incredibly powerful.
The good news is you can close most of these vulnerabilities with a few changes.
Enable Two-Step Verification on WhatsApp
Open WhatsApp settings then Account then Two-step verification, and create a six digit PIN. This prevents anyone from registering your number elsewhere even after a SIM swap.
Lock Down Your Mobile Carrier Account
Call your carrier and add a Port Out PIN or high security password. This makes unauthorized SIM swaps significantly harder.
Hide Your Public Profile Details
Set your profile photo, About, and Last Seen to My Contacts or Nobody. You remove the social proof that criminals depend on.
Read our guide on how to recover your WhatsApp Account.
FAQs
How did attackers get the 137 million US phone numbers
Researchers used enumeration techniques to confirm which numbers were active on WhatsApp. They did not break encryption but mapped publicly visible metadata.
Does this mean WhatsApp messages are exposed?
No. Messages remain end-to-end encrypted. The risk comes from confirmed phone numbers and public profile data.
Is every US WhatsApp user affected?
Only numbers that were active and had publicly visible details. But the scale is huge enough to matter for everyone.
Can this lead to bank account theft?
Yes. SIM swapping enabled by confirmed numbers and personal details can give criminals access to SMS based banking codes.
Should I stop using WhatsApp?
Not necessary. But you should tighten privacy settings and turn on two-factor protection immediately.
How do I stay ahead of scams like this?
Install the ScamAdviser app for real-time alerts, scam checks, and practical protection tips tailored to trending threats.
Read the full report here
Have you fallen for a hoax, bought a fake product? Report the site and warn others!
As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu
How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction