Silent Monitoring of Communications Application Users' Behavior and Its Significance for Critical Infrastructure Protection

19. decembra 2025

In December 2025, a practical proof of vulnerability in the communications applications WhatsApp and Signal was published, enabling silent monitoring of user behaviour based exclusively on knowledge of their phone number. 

This does not involve breaking encryption or compromising accounts. It concerns the exploitation of characteristics of these applications' delivery mechanisms, which allow indirect analysis of user behaviour without their knowledge.

The vulnerability stems from the way applications confirm receipt of network packets. Receipt confirmation is sent before the application verifies whether a message or reaction to a message actually exists. In practice, this means that an attacker can send special reactions to non-existent messages, with the target device responding without any notification or trace being displayed to the user in the user interface.

By measuring the response time between sending a request and receiving confirmation, it is possible to monitor changes in device behaviour over the long term. These time characteristics differ significantly depending on whether the device is active or in standby mode, whether it is connected via Wi-Fi or mobile network, or whether the user is moving. With systematic measurement, it is possible to determine with a high degree of probability periods of activity, inactivity, sleep, movement, or complete device shutdown.

From a practical perspective, this is a form of behavioural profiling. It does not allow reading communication content, but it enables reconstruction of daily routines, habits, and availability of a specific person. Combined with high probing frequency, this mechanism also has secondary consequences in the form of increased battery consumption and mobile data usage, which can lead to reduced device availability in critical situations without the user immediately noticing.

From the perspective of critical infrastructure protection, it is important to emphasize that the threat does not concern the technical systems of the applications themselves, but the persons who design, operate, and manage critical infrastructure. Operational personnel of energy networks, transport, water management, telecommunications, healthcare, public administration, and defence represent legitimate targets of intelligence and hybrid activities.

Position of AKI

The Critical Infrastructure Association of the Slovak Republic considers the findings concerning silent behavioural monitoring of communications application users to be relevant from the perspective of critical infrastructure protection and its personnel. AKI SR warns that leaks of metadata and temporal characteristics of communication can have significant intelligence value, even in cases where the communication content itself is strongly encrypted.

Mass-used communications applications represent a technological and operational dependency that must be taken into account when assessing risks according to the NIS2 directive and related regulatory frameworks. Critical infrastructure protection cannot be limited exclusively to technical systems, but must also include protection of the availability, behaviour, and routines of key personnel.

AKI SR recommends that critical infrastructure operators take these types of threats into account within risk analyses, mobile device usage policies, and assessments of digital dependencies.

19. decembra 2025
V decembri 2025 bol zverejnený praktický dôkaz zraniteľnosti komunikačných aplikácií WhatsApp a Signal , ktorý umožňuje tiché sledovanie správania používateľov výlučne na základe znalosti ich telefónneho čísla.
17. decembra 2025
Yesterday, December 16, 2025, a memorandum of cooperation was signed between the Slovak Chamber of Commerce and Industry (SOPK) and the Critical Infrastructure Association of the Slovak Republic (AKI SR). The memorandum was signed by Peter Mihók, President of the Slovak Chamber of Commerce and Industry and Tibor Straka, President of the Critical Infrastructure Association of the Slovak Republic.
17. decembra 2025
Včera 16. decembra 2025 bolo podpísané memorandum o spolupráci medzi Slovenskou obchodnou a priemyselnou komorou (SOPK) a Asociáciou kritickej infraštruktúry Slovenskej republiky (AKI SR). Memorandum podpísali Peter Mihók, predseda Slovenskej obchodnej a priemyselnej komory a Tibor Straka, prezident Asociácie kritickej infraštruktúry Slovenskej republiky.
17. decembra 2025
Representatives of the Critical Infrastructure Association of the Slovak Republic (AKI SR) discussed on December 16, 2025 with the management of EXIMBANKA SR about possibilities of cooperation in the area of supporting strategic critical infrastructure projects.
17. decembra 2025
Zástupcovia Asociácie kritickej infraštruktúry Slovenskej republiky (AKI SR) rokovali 16. decembra 2025 s vedením EXIMBANKY SR o možnostiach spolupráce v oblasti podpory strategických projektov kritickej infraštruktúry.
11. decembra 2025
On Thursday, December 4, 2025, a joint meeting of the Presidium and Supervisory Board of the Critical Infrastructure Association of the Slovak Republic took place.
11. decembra 2025
Vo štvrtok 4. decembra 2025 sa uskutočnilo spoločné rokovanie Prezídia a Dozornej rady Asociácie kritickej infraštruktúry Slovenskej republiky.
3. decembra 2025
The Critical Infrastructure Association of the Slovak Republic (AKI SR) expresses serious concern over the cybersecurity incident that was identified at the Ministry of Economy of the Slovak Republic .
3. decembra 2025
Asociácia kritickej infraštruktúry Slovenskej republiky (AKI SR) vyjadruje vážne znepokojenie nad kybernetickým incidentom, ktorý bol identifikovaný na Ministerstve hospodárstva SR .
27. novembra 2025
The Critical Infrastructure Association of the Slovak Republic (AKI SR) actively participated in the Autumn ITAPA 2025 conference, which took place on November 25–27 in Bratislava.