Skip to content

Critical WhatsApp 0-Click Vulnerability Exploited via DNG File – Watch Your Crypto!

Finger tapping WhatsApp icon on iPhone. Critical WhatsApp 0-Click Vulnerability Exploited via DNG File - Watch Your Crypto!

Key Takeaways

  • A WhatsApp 0-click vulnerability exploited via a malicious DNG file grants attackers full device control.
  • The attack combines two flaws: a message spoofing bug (CVE-2025-55177) and a DNG parsing flaw (CVE-2025-43300).
  • Crypto users are prime targets for this silent spyware, risking private key and wallet drain.

The Silent Attack Explained

Security researchers have exposed a dangerous WhatsApp 0-click vulnerability exploited to hijack iPhones, Macs, and iPads. A threat actor initiates the attack by sending a specially crafted DNG image file with no user action required; even receiving it compromises the target. This WhatsApp 0-click vulnerability exploited a critical logic flaw in validating messages in WhatsApp, allowing attackers to effectively spoof messages as coming from a trusted mobile device linked to the WhatsApp account.

WhatsApp 0-click vulnerability exploited: A newly revealed exploit chain can remotely compromise Apple devices through WhatsApp without any user interaction.
DarkNavy cybersecurity researchersโ€™ X post exposing the WhatsApp 0-click vulnerability exploited.

How The Exploit Chain Unfolds

This breach occurs in a two-step process:

  • First vulnerability CVE-2025-55177: The spoofed message bypasses all normal security checks. 
  • Second vulnerability CVE-2025-43300: The malicious DNG file exploits a memory corruption bug when WhatsApp tries to process it. WhatsApp automatically parses files and automatically executes code, requiring no victim interaction. 

Different from attacks that require a click, this WhatsApp 0-click vulnerability exploited the app’s automated file parsing, letting it be completely silent and undetected to the victim. Once successfully breached, the attacker gets full access to the device, all messages, all apps, including crypto wallets, and all stored data.

WhatsApp 0-click vulnerability exploited: A newly revealed exploit chain can remotely compromise Apple devices through WhatsApp without any user interaction.
Proof-of-Concept of the WhatsApp 0-click vulnerability exploited (Image source: DarkNavy)

Read also: Cybercrime Alarm: GreedyBear Hackers Steal $1M Via Weaponized Firefox Extensions

Critical Implications for the Crypto Community

For anyone involved in crypto, this is particularly dangerous. If a device is compromised, someone can steal seed phrases, private keys, and access to exchange apps. The demonstrated WhatsApp 0-click vulnerability exploited suggests that even non-technical targets can easily become victimized with spyware designed to drain digital assets. High-net-worth individuals and project leaders in the industry are probably at the top of a target list for espionage.

Read also: Malaysian MPs Targeted in Coordinated AI Deepfake Extortion for Crypto

Summing Up

This incident serves as a stiff reminder that even the most trusted communication apps can become the weakest link in our digital security without even having any type of interaction. Malicious actors are always working on developing new and more technical attacks that can cause considerable headaches, or worse.  

Final Thought: The silent nature of this attack means vigilance and proactive security are non-negotiable nowadays. Updating your applications is the first, primary step to safety.


FAQs

What is a 0-click vulnerability?

It’s a remote code execution (RCE) security vulnerability that allows the exploitation of a device when the victim does not click on anything or take any action.

What is a DNG file?

DNG or Digital Negative refers to a file format for raw images from digital cameras, which, in this case, was maliciously crafted to hack the device.

How can I protect myself?

Immediately update WhatsApp and your device’s operating system to the latest version to patch the vulnerability.


For security breach stories, read: Hyperdrive Smart Contract Exploit Drained of $782,000 in Funds

Disclaimer: All content provided on Times Crypto is for informational purposes only and does not constitute financial or trading advice. Trading and investing involve risk and may result in financial loss. We strongly recommend consulting a licensed financial advisor before making any investment decisions.

A Web3 Journalist at TimesCrypto with a knack for turning complex ideas into engaging stories. With a solid Tech background, Alan has led teams to create and refine impactful projects across industries, working in firms such as IBM, Cisco Systems, and Telecom. Heโ€™s passionate about Blockchain, Finance, Science, bringing a unique blend of technical expertise and creative flair to every piece he writes. When heโ€™s not crafting content, youโ€™ll find him diving deep into research or just having some fun!

Zoomable Image