Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
UtiliaCS 970x120
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

6 January 2026 09:21

WhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without official announcement and are currently only partial.

The problem concerns so-called device fingerprinting, a technique that allows an attacker to deduce sensitive information such as the operating system used by the victim.

While end-to-end encryption protects the contents of messages, some design choices in the multi-device protocol expose metadata that is useful in the reconnaissance phase of a cyberattack.

In cyberespionage or targeted malware distribution operations, the reconnaissance phase is crucial. Knowing in advance whether a victim is using Android or iOS allows attackers to deploy compatible exploits, reducing the risk of errors that could compromise valuable zero-day vulnerabilities or complex and expensive infrastructure.

In early 2024, independent researchers documented how WhatsApp’s multi-device E2EE protocol allowed them to distinguish individual devices associated with an account due to the use of separate cryptographic sessions for each device . Subsequent analyses showed how these sessions could be exploited to selectively target a user’s specific device.

In 2025, a study by Gegenhuber and colleagues demonstrated that these differences are not limited to the device’s identity, but also allow for its complete digital fingerprinting, including the precise identification of the operating system. This information can be obtained by querying WhatsApp servers, without any direct interaction with the victim’s device and therefore without the user’s knowledge.

Using a proprietary analysis tool, researchers recently observed a change in Android’s cryptographic identifier management logic. Previously, some parameters were initialized with predictable incremental values; now, at least on Android, these values are randomly assigned.

This change represents the first sign of WhatsApp addressing a long-standing issue, initially not considered relevant from a privacy perspective. However, the distinction between Android and iPhone is highly likely still possible, as iOS continues to use a different initialization logic, based on gradual increases.

The issue of transparency also remains open.

The fixes were applied without formally notifying the researchers who reported the vulnerabilities, without assigning a CVE, and in some cases, without adequate bug bounty recognition.

According to the authors of the research, a more structured and open collaboration with the security community would help improve user protection on a global scale.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.