Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Crowdstriker 970×120
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

6 January 2026 09:21

WhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without official announcement and are currently only partial.

The problem concerns so-called device fingerprinting, a technique that allows an attacker to deduce sensitive information such as the operating system used by the victim.

While end-to-end encryption protects the contents of messages, some design choices in the multi-device protocol expose metadata that is useful in the reconnaissance phase of a cyberattack.

In cyberespionage or targeted malware distribution operations, the reconnaissance phase is crucial. Knowing in advance whether a victim is using Android or iOS allows attackers to deploy compatible exploits, reducing the risk of errors that could compromise valuable zero-day vulnerabilities or complex and expensive infrastructure.

In early 2024, independent researchers documented how WhatsApp’s multi-device E2EE protocol allowed them to distinguish individual devices associated with an account due to the use of separate cryptographic sessions for each device . Subsequent analyses showed how these sessions could be exploited to selectively target a user’s specific device.

In 2025, a study by Gegenhuber and colleagues demonstrated that these differences are not limited to the device’s identity, but also allow for its complete digital fingerprinting, including the precise identification of the operating system. This information can be obtained by querying WhatsApp servers, without any direct interaction with the victim’s device and therefore without the user’s knowledge.

Using a proprietary analysis tool, researchers recently observed a change in Android’s cryptographic identifier management logic. Previously, some parameters were initialized with predictable incremental values; now, at least on Android, these values are randomly assigned.

This change represents the first sign of WhatsApp addressing a long-standing issue, initially not considered relevant from a privacy perspective. However, the distinction between Android and iPhone is highly likely still possible, as iOS continues to use a different initialization logic, based on gradual increases.

The issue of transparency also remains open.

The fixes were applied without formally notifying the researchers who reported the vulnerabilities, without assigning a CVE, and in some cases, without adequate bug bounty recognition.

According to the authors of the research, a more structured and open collaboration with the security community would help improve user protection on a global scale.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

  • cyber espionage
  • device fingerprinting
  • digital security
  • E2EE
  • malware attacks
  • Meta
  • multi-device protocol
  • privacy threats
  • vulnerability fixes
  • WhatsApp security
Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.