• Data Exposure
  • Privacy & Security
  • Social Platforms

WhatsApp API Flaw Enables Scraping of 3.5 Billion Accounts

7 minute read

By Tech Icons
1:24 pm
Save
Abstract digital illustration showing a fragmented human face composed of data-like geometric layers, symbolizing large-scale exposure of WhatsApp user metadata through API vulnerabilities.
Image credits: A digital composite face illustrating the scale and exposure of user metadata revealed through WhatsApp’s unsecured contact-discovery API / Artwork by Cybermagician / Shutterstock.com

Researchers exploit missing rate limiting in WhatsApp contact discovery API to scrape user data from billions of active accounts worldwide

Key Takeaways

  • 3.5 billion WhatsApp accounts scraped by researchers exploiting an API vulnerability without rate limiting, using just one university server and five authenticated sessions to process 63 billion potential mobile numbers.
  • Rate limiting introduced in October 2025 after researchers reported the flaw in April, though Meta maintains no private messages or non-public data were accessed during the research.
  • Insurance premiums spike 40-150% for organizations using WhatsApp, as cyber insurers reassess coverage following the exposure of 315 million business accounts in the dataset.

Introduction

Researchers have compiled a massive database of 3.5 billion WhatsApp mobile phone numbers and related personal information by exploiting a contact-discovery API that did not have rate limiting. This vulnerability allowed the extraction of data at a significant scale.

The WhatsApp API vulnerability that enabled researchers to scrape data from 3.5 billion accounts marks a significant event for the tech industry, with wide-ranging business, financial, and strategic implications. The incident highlights persistent weaknesses in API security, regulatory exposure, and the evolving risk landscape for messaging platforms and their parent companies.

Key Developments

The researchers, from the University of Vienna and SBA Research, leveraged WhatsApp’s GetDeviceList API endpoint to perform their investigation. This feature lets users check if a phone number is associated with a WhatsApp account. The absence of rate limiting enabled them to process over 100 million numbers per hour, undetected by WhatsApp’s monitoring systems.

The operation utilized only a single university server and five authenticated sessions to examine 63 billion potential mobile numbers. The study was conducted using modified open source clients that queried WhatsApp infrastructure directly rather than through official applications. The result was identifying 3.5 billion active WhatsApp accounts, presenting a global overview of WhatsApp’s usage.

The research team promptly reported the issue to WhatsApp in April 2025, and rate-limiting controls were introduced in October. Although Meta acknowledged the issue, stating that no private messages or non-public data were accessed, the researchers emphasized that the lack of technical barriers suggested similar collection efforts could have occurred undetected.

Beyond confirming the existence of WhatsApp accounts, the researchers accessed additional user information through other API endpoints. They retrieved data such as profile photos, “about” text, device details, business tags, and public-facing encryption keys, without encountering any rate limitations. The researchers retrieved profile photos for 57 percent of users and “About” information for 29 percent.

Market Impact

India emerged as the leading nation with 749 million accounts, followed by Indonesia and Brazil with 235 million and 206 million accounts, respectively. The study also identified active users in countries where WhatsApp is officially banned, such as China with 2.3 million accounts, Iran, Myanmar with 1.6 million accounts, and North Korea.

The breach exposed 315 million business accounts, representing 9 percent of those scraped, raising significant enterprise risk concerns. Cyber insurers are reacting by hiking premiums for organizations using WhatsApp by 40 to 150 percent, reducing coverage, or excluding WhatsApp-related incidents altogether.

The direct costs of such a breach can range from $180,000 to $27 million per affected organization, depending on the size and exposure. Regulatory fines pose additional financial risk: under GDPR, penalties can reach up to €20 million or 4 percent of global annual turnover for security failures.

Close-up of a smartphone corner displaying the WhatsApp icon, representing exposure risks linked to the platform’s unsecured contact-discovery API.
Image credits: A close-up of the WhatsApp icon on a smartphone home screen, illustrating the platform’s API vulnerability that enabled large-scale user data scraping / Shutterstock.com

Strategic Insights

The breach demonstrates that even mature platforms with billions of users can be compromised by relatively simple flaws in API design. This incident underlines the critical need for robust API security as a core part of product development and risk management strategies.

Meta, WhatsApp’s parent company, has already faced penalties—such as a €265 million fine by the Irish Data Protection Commission—and faces further scrutiny in the EU and other jurisdictions. Regulators in the EU, India, and elsewhere are using the incident to push for stricter compliance and transparency.

The breach exposed the risks of relying on consumer messaging apps like WhatsApp for enterprise communications. Business leaders are reassessing the viability of WhatsApp for commercial use, potentially accelerating demand for secure enterprise messaging solutions with stronger security controls.

This incident mirrors broader issues across platforms regarding API vulnerabilities. In 2021, a bug in Facebook’s “Add Friend” feature enabled scrapers to compile data on 533 million users. Similarly, an API flaw on Twitter led to the exposure of 54 million account details.

Expert Opinions and Data

In a statement, Nitin Gupta, VP of Engineering at WhatsApp, said, “We are grateful to the University of Vienna researchers for their responsible partnership and diligence under our Bug Bounty program. This collaboration successfully identified a novel enumeration technique that surpassed our intended limits, allowing the researchers to scrape basic publicly available information.”

Gupta emphasized that the researchers have securely deleted the data collected as part of the study, and Meta has found no evidence of malicious actors abusing this vector. He noted that user messages remained private and secure thanks to WhatsApp’s default end-to-end encryption.

According to The Register, security experts view this as a critical failure of basic API hygiene. The lack of rate limiting is widely seen as an avoidable flaw, particularly for a platform of WhatsApp’s scale. The reuse of encryption keys across accounts further undermines trust in the platform’s security model.

Data visibility varied by country and user preferences. In India, 62 percent of accounts showed profile photos, while Brazil had a similar rate at 61 percent. In the United States, 44 percent of users displayed photos and 33 percent included visible “About” texts.

A notable comparison was made with the 2021 Facebook scrape, finding that 58 percent of those phone numbers were still active on WhatsApp. Millions of encryption keys were reused across different accounts, despite expectations that each key should be unique, with some consisting entirely of zeroes due to flawed implementations by third-party clients.

Conclusion

The tech industry faces a shift toward stricter API security standards, increased regulatory intervention, and heightened scrutiny of data sharing practices. Meta has implemented new rate limits and credited researchers for responsible disclosure, though experts argue that public key reuse and metadata exposure still pose significant risks.

The incident represents the largest scrape in messaging platform history and serves as a critical reminder that API vulnerabilities remain a fundamental business risk. Organizations now confront higher insurance costs, potential regulatory penalties, and the need to reassess their communication platforms for both consumer and enterprise use.

 

Related News

Cisco Breach Exposes User Data After Vishing Attack on Staff

Read more

Coinbase Contractors Bribed by Hackers in 69,000-Customer Data Breach

Read more

AI Cyberattacks Surge as Deepfakes and ML Breach Defenses

Read more

AI-Powered Attacks Now Evade Microsoft Defender

Read more

EU's DORA Law Sets New Cybersecurity Standards for Finance Sector

Read more

AT&T to Pay $177M in Data Breach Settlement

Read more

Cybersecurity News

View All
Cisco launches Foundation-Sec-8B-Reasoning, an open-weight cybersecurity AI model designed to outperform general systems through domain-specific intelligence.

Cisco Unveils AI Security Model Built on Decades of Threat Data

Read more
Red critical system error warning popup indicating a potential cybersecurity breach as SitusAMC reports data breach

SitusAMC Data Breach Exposes Major Bank Client Information

Read more
Abstract digital illustration showing a fragmented human face composed of data-like geometric layers, symbolizing large-scale exposure of WhatsApp user metadata through API vulnerabilities.

WhatsApp API Flaw Enables Scraping of 3.5 Billion Accounts

Read more