Hackers can seize practically all your online accounts, and it's your voicemail's fault

By hacking your voicemail, a security researcher says he's found a way to take over Google, Microsoft, Apple, and WhatsApp accounts.
 By 
Jack Morse
 on 
Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

Who would have thought that, in the end, it would be the humble voicemail that would do us all in?

Your Google, Microsoft, Apple, WhatsApp, and even Signal accounts all have an Achilles' heel — the same one, in fact. And it turns out that if you're not careful, a hacker could use that weakness to take over your online identity.

Or so claims self-described "security geek" Martin Vigo. Speaking to an enthusiastic collection of hackers and security researchers at the annual DEF CON convention in Las Vegas, Vigo explained how he managed to reset passwords for a wide-ranging set of online accounts by taking advantage of the weakest link in the security chain: your voicemail.

You see, he explained to the crowd, when requesting a password reset on services like WhatsApp, you have the option of requesting that you receive a call with the reset code. If you happen to miss the phone call, the automated service will leave a message with the code.

But what if it wasn't you trying to reset your password, but a hacker? And what if that hacker also had access to your voicemail?

Here's the thing: Vigo wrote an automated script that can almost effortlessly bruteforce most voicemail passwords without the phone's owner ever knowing. With that access, you could get an online account's password reset code and, consequently, control of the account itself.

Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

And no, your two-factor authentication won't stop a hacker from resetting your password.

One of Vigo's slides laid out the basic structure of the attack:

1. Bruteforce voicemail system, ideally using backdoor numbers

2. Ensure calls go straight to voicemail (call flooding, OSINT, HLR)

3. Start password reset process using "Call me" feature

4. Listen to the recorded message containing the secret code

5. Profit!

A recorded demo he played on stage showed a variation of this attack on a PayPal account.

"In three, two, one, boom — there it is," Vigo said to audience applause. "We just compromised PayPal."

Vigo was careful to note that he responsibly disclosed the vulnerabilities to the affected companies, but got a less than satisfactory response from many. He plans to post a modified version of his code to Github on Monday.

Notably, he reassures us that he altered the code so that researchers can verify that it works, but also so that script kiddies won't be able to start resetting passwords left and right.

So, now that we know this threat exists, what can we do to protect ourselves? Vigo, thankfully, has a few suggestions.

First and foremost, disable your voicemail. If you can't do that for whatever reason, use the longest possible PIN code that is also random. Next, try not to provide your phone number to online services unless you absolutely have to for 2FA. In general, try to use authenticator apps over SMS-based 2FA.

But, really, the most effective of those options is shutting your voicemail down completely. Which, and let's be honest here, you've likely been looking for a reason to do anyway. You can thank Vigo for providing you with the excuse.

Topics Cybersecurity

Mashable Image
Jack Morse

Professionally paranoid. Covering privacy, security, and all things cryptocurrency and blockchain from San Francisco.

Mashable Potato

Recommended For You
Iran-linked hackers launch cyberattack against U.S. medtech company Stryker
Stryker logo on medical equipment

How hackers are stealing millions from ATMs, FBI warns
a card being inserted into an atm

Homeland security pushes social media giants to dox anonymous accounts critical of ICE
By Jack Dawes
Ice Police Law Enforcement - Department of Homeland Security, Immigration and Customs Agents - stock photo

Match Group responding to alleged hack of user data
Tinder and Match Group logo displayed on a phone screen

Hackers are exploiting a vulnerability in lots of e-commerce sites
Fish-eye lens view of a computer screen with hacking stuff on it

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

NYT Strands hints, answers for April 3, 2026
A game being played on a smartphone.

What's new to streaming this week? (April 3, 2026)
A composite of images from film and TV streaming this week.

The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!