Thursday, 02 December 2021 07:16 GMT

Oman CERT rings the warning bell after WhatsApp hacking cases increase


(MENAFN- Muscat Daily) Muscat- There has been a significant increase in WhatsApp hacking cases in Oman, the Information Technology Authority (ITA) said on Twitter.

ITA stated that Oman National CERT (OCERT) has noticed an increase in the number of hacking cases involving the popular messaging application. The fraudsters hack by accessing the Security Verification Code of victims. The hackers use the victim's identity and reach out to people on the contact list asking for money transfer.

OCERT strongly recommends WhatsApp users to follow some steps to prevent such incidents, 'Never disclose or send your WhatsApp verification code or verification message to anyone. Never click on links received through SMS that contain a WhatsApp verification code. Enable a two-step verification from WhatsApp settings and never respond to WhatsApp messages requesting money transfer even if the number is from your contact list. If your WhatsApp has been hacked into, notify your contact list about it.'

The solution to this is to just uninstall and reinstall the application. 'Just reinstall the WhatsApp application on the phone by registering your number again and wait for the verification code. If you are requested to insert a two-step verification number click on Forgot Pin option. A message will appear on the screen stating that WhatsApp will be suspended for seven days. If no message appears, click contact support on the same page and write, 'My WhatsApp account has been hacked. Please suspend my account number 9xxxxxxx'.'

MENAFN1306201801410000ID1097006987


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.