WhatsApp Rolls Out Strict Account Settings to Block Cyberattacks

WhatsApp Rolls Out Strict Account Settings to Block Cyberattacks

Meta's WhatsApp messaging service has deployed a comprehensive security enhancement called "Strict Account Settings," designed to protect high-risk users from advanced cyber threats targeting journalists, activists, and public figures worldwide.

The feature represents the most significant security overhaul for the platform since its implementation of end-to-end encryption in 2016.

The timing of this rollout proves particularly notable, arriving just days after Meta faced a class-action lawsuit alleging the company maintains backdoor access to private communications despite end-to-end encryption promises.

While Meta has dismissed these allegations as "a frivolous work of fiction," the new security feature underscores the escalating digital threats facing vulnerable user populations.

A Lockdown Approach to Digital Safety

Strict Account Settings functions as a one-click security solution that automatically implements the most restrictive privacy configurations across the platform.

Users can activate the feature by navigating to Settings > Privacy > Advanced, where a single toggle initiates a cascade of protective measures.

The feature automatically blocks all media and attachments from unknown senders, preventing malicious files disguised as images or videos from reaching target devices.

This addresses a critical vulnerability exploited in sophisticated spyware campaigns, where adversaries embed malware within seemingly innocuous content.

Link previews—those thumbnail images that appear when URLs are shared in conversations—are completely disabled under the strict mode. This seemingly minor adjustment carries significant security implications, as link previews can expose a user's IP address to third-party websites and serve as vectors for malicious code delivery.

Security researchers have identified preview generation as a particularly vulnerable moment when devices connect to external servers to retrieve metadata.

Call functionality undergoes substantial modification as well. The system automatically silences incoming calls from numbers not saved in the user's contact list, preventing zero-click attacks that have previously infiltrated devices through missed calls.

WhatsApp further enhances call security by routing all voice and video communications through its servers to mask users' IP addresses, though this relay method may slightly reduce call quality.

Comprehensive Privacy Lockdown

Beyond blocking external threats, Strict Account Settings fundamentally alters how users appear on the platform. Profile photos, status updates, "about" information, and online status indicators become visible exclusively to saved contacts.

The last seen timestamp—a feature that reveals when someone last opened the application—similarly restricts to contacts only.

Group invitation controls shift to their most restrictive setting, permitting only saved contacts to add users to group conversations.

When someone outside the contact list attempts to add a user, the system blocks the action and prompts the admin to send a private invitation instead, which expires after 72 hours.

The security package automatically enables two-step verification, requiring a six-digit PIN for account access.

This additional authentication layer helps prevent unauthorized account takeovers even if someone obtains a user's phone number and SMS verification code.

Security notifications activate automatically to alert users whenever an encryption code changes during conversations.

This feature proves critical for detecting potential man-in-the-middle attacks, where adversaries attempt to intercept communications by impersonating one of the conversation participants.

Lessons From the Spyware Wars

The feature emerges directly from WhatsApp's prolonged legal battles with the surveillance technology industry, particularly Israeli firm NSO Group, developer of the notorious Pegasus spyware.

In 2019, NSO Group exploited a WhatsApp vulnerability to target approximately 1,400 devices belonging to attorneys, journalists, human rights activists, political dissidents, diplomats, and government officials across 51 countries.

The attack proved particularly insidious because it required zero user interaction—victims' devices became compromised simply by receiving a WhatsApp call, even if they never answered.

This category of exploit, known as a "zero-click attack," represents the most dangerous form of digital intrusion because it bypasses all user decision-making that typically serves as a defensive layer.

In May 2025, a California jury ordered NSO Group to pay $167.25 million in punitive damages to Meta, marking the first time a spyware manufacturer faced financial consequences for capitalizing on vulnerabilities within smartphone systems.

The landmark ruling established legal precedent for technology companies to pursue damages against surveillance vendors who exploit their platforms.

The legal victory, however, did not eliminate the threat.

In January 2025, WhatsApp disrupted another spyware campaign by Paragon, a competing surveillance vendor, which targeted 90 journalists and civil society members across more than 20 countries using similar zero-click exploitation techniques.

Rust Implementation Strengthens Foundation

Concurrent with the Strict Account Settings rollout, WhatsApp has completed a comprehensive rewrite of its media handling infrastructure using Rust, a memory-safe programming language that significantly reduces vulnerability to exploitation.

The transition from C++ to Rust represents what Meta describes as "the largest rollout globally of any library written in Rust," spanning Android, iOS, macOS, web clients, and wearable devices.

The Rust-based architecture powers a proprietary scanning system called "Kaleidoscope," which inspects file structure compliance, detects spoofed MIME types, and flags high-risk formats such as executables and embedded scripts within PDFs.

Memory safety vulnerabilities in C++ have historically provided entry points for sophisticated attacks.

By adopting Rust, which enforces memory safety through its compiler rather than relying on programmer discipline, WhatsApp aims to eliminate entire categories of potential exploits before they reach production systems.

The Rust implementation showed performance advantages over the original C++ version while reducing the codebase by nearly half.

Differential fuzzing and extensive integration testing ensured compatibility between the two implementations during the transition period.

Third Major Platform to Offer Advanced Protection

WhatsApp joins Apple and Alphabet in providing enhanced security modes for high-risk users, though each implementation reflects different philosophical approaches to the security-usability tradeoff.

Apple introduced "Lockdown Mode" in 2022, describing it as "an optional, extreme protection" for individuals facing advanced digital threats.

The iOS and macOS feature disables most message attachment types, blocks link previews, and restricts FaceTime calls and web browsing capabilities.

Alphabet's Android platform launched "Advanced Protection Mode" in 2024 for users with "heightened security awareness." Similar to Apple's approach, the feature restricts downloading applications from outside the official Play Store, limiting users' exposure to potentially compromised software.

John Scott-Railton, senior researcher at The Citizen Lab at the University of Toronto, characterized WhatsApp's announcement as "a very welcome development" that will help protect dissidents and activists while encouraging other technology companies to enhance their security measures.

Scott-Railton has worked extensively with WhatsApp to identify and notify targets of NSO Group spyware campaigns.

Target Audience and Rollout Timeline

WhatsApp emphasizes that Strict Account Settings serves a specific demographic rather than the general user population.

The feature targets journalists covering sensitive stories, human rights activists operating in hostile territories, and public figures whose communications have become high-value targets for state-sponsored surveillance.

"We also know that a few of our users—like journalists or public-facing figures—may need extreme safeguards against rare and highly sophisticated cyberattacks," the company stated in its announcement.

The system includes warnings that "you should only turn this on if you think you may be a target of a sophisticated cyber campaign" and notes that "most people are not targeted by such attacks".

The feature began rolling out gradually on January 27, 2026, with availability expanding over subsequent weeks.

Users must enable the setting from their primary device; companion platforms like WhatsApp Web or Windows applications cannot modify this security configuration.

Platform Security Amid Privacy Scrutiny

The security enhancement arrives as WhatsApp confronts renewed scrutiny over its encryption practices.

A lawsuit filed January 23, 2026, in US District Court for the Northern District of California challenges Meta's core privacy proposition, alleging the company retains technical capability to decrypt and access message content despite end-to-end encryption claims.

The complaint, representing users from India, Brazil, Australia, Mexico, and South Africa, cites unnamed whistleblowers and claims Meta employees can access private communications through internal tools.

The 51-page lawsuit alleges that workers need only request access from engineering teams to view messages through a widget linked to users' unique identifiers.

Meta spokesperson Andy Stone issued a forceful rebuttal, stating: "Any claim that people's WhatsApp messages are not encrypted is categorically false and absurd.

WhatsApp has been end-to-end encrypted using the Signal protocol for a decade". The company indicated it would pursue legal sanctions against the plaintiffs' counsel.

The controversy intensified when Elon Musk weighed in on social media platform X, asserting "WhatsApp is not secure.

Even Signal is questionable. Use X Chat". WhatsApp head Will Cathcart responded by calling the lawsuit "a no-merit, headline-seeking lawsuit".

WhatsApp has employed the Signal Protocol for end-to-end encryption since 2016, when the feature rolled out to the platform's then-1 billion users. The open-source protocol generates unique encryption keys for each user and session, with regular rotation to enhance security.

Cryptographic authentication codes maintain message integrity, and the system operates on a principle where encryption keys exist only on sender and recipient devices, not on WhatsApp servers.

Strategic Implications for Digital Security

The Strict Account Settings feature represents an acknowledgment that end-to-end encryption, while necessary, proves insufficient against nation-state adversaries with access to sophisticated exploitation techniques.

Zero-click attacks bypass content-level encryption entirely by targeting vulnerabilities in the software that processes encrypted data.

This reality forces platforms to implement defense-in-depth strategies where multiple security layers work in concert.

By automatically blocking unknown media, disabling link previews, routing calls through relay servers, and restricting profile visibility, WhatsApp creates numerous obstacles that adversaries must overcome simultaneously.

The tradeoff involves reduced functionality and potential degradation in user experience. Call quality diminishes when routing through WhatsApp servers rather than establishing direct peer-to-peer connections.

The inability to receive media from unknown senders could impede legitimate communications from sources who cannot be pre-verified.YouTube

For users facing genuine threats—investigative journalists communicating with anonymous sources, activists organizing in authoritarian contexts, or public figures targeted by harassment campaigns—these tradeoffs represent acceptable compromises for enhanced security.

The feature design acknowledges that different user populations face vastly different threat models and require correspondingly different security postures.

WhatsApp's 3 billion monthly active users make it the most widely used messaging platform globally.

While Strict Account Settings serves a relatively small subset of this user base, its implementation signals recognition that platforms bear responsibility for protecting vulnerable users who face disproportionate risks simply because of who they are and what they do.

The feature rollout coincides with European Union regulatory action designating WhatsApp as a Very Large Online Platform under the Digital Services Act, imposing additional compliance requirements including assessment and mitigation of systemic risks related to illegal content dissemination and electoral manipulation.

Meta faces a mid-May 2026 deadline to bring WhatsApp's Channels feature into DSA compliance.

As sophisticated cyber threats continue evolving, the introduction of Strict Account Settings establishes a new baseline expectation for how messaging platforms protect high-risk users.

Whether competing platforms follow suit with comparable features will likely depend on regulatory pressure, competitive dynamics, and the frequency with which exploitation incidents capture public attention and erode user trust in digital communications security.

Kira Sharma - image

Kira Sharma

Kira Sharma is a cybersecurity enthusiast and AI commentator. She brings deep knowledge to the core of the internet, analyzing trends in Cybersecurity & Privacy, the future of Artificial Intelligence, and the evolution of Software & Apps.