Confirmed – millions of users could be being watched on WhatsApp without knowing it – these are the key signs

July 14, 2025
Confirmed - millions of users could be being watched on WhatsApp without knowing it - these are the key signs

Today, instant messaging apps are the primary form of communication worldwide. WhatsApp is the communications giant. With the inclusion of voice and video calls, users are connected at all times. This has led to cases of digital espionage, hacking, fraud, and even viruses introduced into smartphones via WhatsApp. This is why it’s important to have two-step verification that activates the security of our mobile phones.

How can they spy on someone else via WhatsApp?

On the one hand, if someone obtains someone else’s unlocked smartphone, they can link the account to a computer and access WhatsApp Web. A phone number can also be cloned by duplicating the SIM card or even by using spy apps, i.e., malicious programs installed on smartphones that can send messages to third parties without us realizing it.

These malicious tools often run in the background and can access the phone’s camera and microphone. To ensure your phone is free from hacks or viruses, it’s recommended to use a reliable mobile antivirus and avoid installing apps outside the official Google Play or App Store.

Signs that your phone may be being spied on:

On the one hand, there’s abnormal battery drain, unexplained overheating of the phone, and high mobile data usage, according to Surfshark. You can also see WhatsApp Web logins that aren’t actually being performed by the phone’s user; messages that appear as read but have never actually been read by the phone’s owner; or verification code notifications for third-party login attempts.

For these reasons, it’s important to review the linked devices and log out of those the user doesn’t recognize. You can also activate two-step verification, as mentioned above. To log out of WhatsApp Web, go to ‘Linked Devices’ and select ‘Log out of all devices’. This will remove third-party access. For two-step verification, you can add a PIN that must be entered each time you try to register your phone number on a new device.

It is recommended to review downloaded apps and delete those you don’t use

Sometimes, smartphones can be places where countless apps are stored, even though we don’t know why they were installed in the first place. Therefore, it’s also recommended to review downloaded apps and delete those you don’t use or don’t remember downloading to avoid leaving doors open for strangers to enter.

Nowadays, our privacy can be compromised as technology has advanced by leaps and bounds. Just as citizens can benefit from these advances, they can also see how their personal information can be accessed by almost anyone. One of the applications that almost everyone has on their mobile device is the bank app. In just a couple of clicks, if someone hacks our smartphones, they can obtain all our banking information. That’s why many financial institutions constantly recommend ignoring calls or text messages requesting passwords. Many frauds come through these channels; users, thinking it’s the bank contacting them, end up providing personal information that allows hackers to empty their bank accounts.

Therefore, safety comes first. When in doubt, delete anything you don’t recognize on your phones and use technology responsibly. We can take advantage of all the benefits of technology to our advantage by simply staying informed and avoiding fraud. Being able to send messages or call someone on the other side of the world is a blessing, something humanity couldn’t have imagined 30 years ago. So let’s make the most of the times we live in.