WhatsApp warns about fake app used in spyware campaign targeting users in Italy


WhatsApp has warned around 200 users that they were tricked into installing a fake version of the messaging app that contained spyware. Reuters reported that Meta linked the campaign to ASIGINT, a subsidiary of Italian surveillance company SIO, and said most of the targets were in Italy.

The attack did not abuse WhatsApp’s official app stores or break WhatsApp’s encryption. Instead, attackers relied on social engineering and pushed victims toward an unofficial app that looked like WhatsApp but acted as spyware once installed. Reuters and TechCrunch both reported that WhatsApp said the campaign used deception rather than a flaw in the legitimate app.

That distinction matters. Users who downloaded WhatsApp through the App Store or Google Play did not get infected through this campaign based on the reporting so far. The risk centered on people who installed a counterfeit app through less controlled distribution methods outside the normal store process.

A fake WhatsApp app, not a breach of the real one

WhatsApp says the spyware campaign was highly targeted, not a mass attack. The company logged affected users out of their accounts, cut off the malicious app’s access, and warned victims to remove the fake software. Reuters reported that WhatsApp described the campaign as primarily affecting people in Italy.

TechCrunch reported that WhatsApp accused SIO of creating the fake iPhone app and said the spyware operation targeted a limited number of users. That report also said the bogus app was designed to look like WhatsApp, which helped attackers build trust long enough to get the spyware installed.

This case also fits a broader pattern in Italy. Reuters noted that it marks the second time in about 15 months that Meta has disrupted a spyware operation tied to Italy. That context matters because it shows WhatsApp is dealing with repeated commercial surveillance activity, not a one-off scam.

How the spyware likely reached victims

Apple’s own support documents explain that iPhones can install apps outside the App Store in some circumstances, including enterprise distribution and alternative app distribution in eligible regions. Apple also says users must take explicit trust steps before such apps can run, which helps explain how a socially engineered fake app could still land on a device.

On Android, Google says users can install apps from outside Google Play only after opting in to allow unknown sources, and Play Protect can then warn about harmful apps or scan unknown apps. That means the campaign likely depended on persuading users to bypass normal safety friction rather than silently infecting devices from the official store.

The practical takeaway is simple. This was a spyware distribution campaign disguised as WhatsApp, not proof that WhatsApp itself was hacked. Users face the biggest risk when they install software from links, messages, or “special versions” that do not come from trusted stores or known corporate distribution channels.

What we know so far

Key pointVerified detail
Number of warned usersAbout 200 users were alerted by WhatsApp
Main geographyMost targets were reported to be in Italy
Suspected actorWhatsApp linked the campaign to ASIGINT, a subsidiary of SIO
Delivery methodVictims were tricked into installing a fake WhatsApp app
Official store compromiseNo evidence the App Store or Google Play distributed the malicious app in this case
WhatsApp responseAffected users were logged out and warned to remove the fake app

What users should do now

  • Delete any WhatsApp app that did not come from the App Store or Google Play.
  • Reinstall the official WhatsApp app from the legitimate store for your device.
  • Review device management and enterprise app trust settings on iPhone if you installed software from outside the App Store.
  • Keep Google Play Protect enabled on Android so Google can scan unknown apps and warn about harmful behavior.
  • Treat any message that offers a “special,” “private,” or “updated” version of WhatsApp as suspicious.
  • If you think you installed the fake app, change important passwords and review linked accounts from a clean device. This step is a reasonable precaution because the app reportedly contained spyware.

FAQ

Was the real WhatsApp app hacked?

Current reporting says no. WhatsApp said the campaign used a counterfeit app and social engineering, not a breach of the official app or its core security.

Were only iPhone users affected?

Not necessarily. Some reports focused on iPhones, but Reuters and other coverage said the campaign targeted users through a bogus WhatsApp app and affected roughly 200 people overall, mainly in Italy.

Did the spyware come from the App Store or Google Play?

There is no verified evidence of that in the current reporting. The campaign appears to have used unofficial installation routes and social engineering instead.

Why is this attack important?

Because it shows attackers do not always need a zero-day exploit. Sometimes they only need a convincing fake app, a trusted brand name, and a target willing to install software outside normal channels.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages