• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

FBI warns “phantom hacker” scam exploiting WhatsApp’s screen-sharing feature has stolen over $1 billion since 2024, with attackers viewing passwords, OTPs, and bank details in real-time through encrypted video calls

October 1, 2025 //  by Finnovate

Attackers behind the billion-dollar hack surging across the U.S. will secure remote access to your device, the FBI warns. The “phantom hacker” scam starts with a call or message pretending to be from your bank, warning you have been hacked, helping you move your money to safety. WhatsApp now offers screen sharing, which “allows people to share what’s on their screen in real time. You must be in a video call to share your screen.” WhatsApp warns “we’ll remind you to only share your screen with people you trust,” that’s because “the information displayed on your shared screen, including usernames and passwords, are visible to the person you’re sharing with.” But despite the warning, this is now catching on fast with attackers and because WhatsApp calls are fully encrypted, the platform cannot intercept the threat. “No one outside of the call, not even WhatsApp, can see or hear what you share on your screen.” The initial attack will come by a regular phone call or message. The scammer then asks to move the call to WhatsApp as it’s more secure. There they perpetrate the Phantom Hacker attack to steal your life savings, asking you to share your screen. It’s the same as the original attack, but without the need to have you install software.

Read Article

Category: Cybersecurity, Innovation Topics

Previous Post: « NIST’s ML-KEM-768 standard replaces X25519 and RSA key exchange with lattice-based post-quantum cryptography, protecting banking and healthcare data from “harvest now, decrypt later” attacks ahead of Q-day
Next Post: BeyondID’s Identity Economy report finds credential-based attacks affect 90% of companies, persist undetected for 10 months on average and trace 60% of breaches to internal actors through inadvertent exposure »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.