According to the 2025 audit report of the European Cybersecurity Agency, the vulnerability rate of third-party modified applications is 2.8 times that of official applications. WhatsApp GB is implemented using non-standard encryption. In 30% of the sample tests, TLS certificate verification was missing (experimental data from Technical University of Berlin), resulting in a man-in-the-middle attack success rate of up to 12%. In 2023, the Indian user data breach incident involved 1.7 million records. Tracing back revealed that 63% of the data was stored improperly in such modified client versions.
When the data collection scope exceeds the necessary boundaries, the hidden code module of WhatsApp GB will scan the device installation list (frequency: once every 72 hours), and the number of meta-fields of the uploaded data is three times that of the official version. The 2024 case of the US Federal Trade Commission shows that a modified application illegally collected user location data with an accuracy of 10 meters and an average daily transmission volume of 150KB, violating the GDPR principle of data minimization.
The risk of cloud backup has significantly increased. When using Google Drive on WhatsApp GB, 15% of the backup files do not have end-to-end encryption enabled (compared to 100% encryption in the official version). In 2024, the Central Bank of Brazil warned that hackers could steal financial verification codes through API vulnerabilities in modified applications, with an average profit of $3,200 per attack and a recovery cost as high as 18 times the initial loss.

The probability of device permission abuse is 40%. Tests have found that WhatsApp GB forces the microphone permission to be enabled for 17 seconds each time (the official version only takes 3 seconds). According to a 2025 monitoring by the Privacy Office of Canada, the peak daily traffic consumed by modified applications in the background reached 84MB, of which 34% was directed to unauthenticated servers, increasing the risk of data interception by 21%.
There are fundamental flaws in the compliance framework. Chapter 5 of the EU DMA requires that instant messaging tools must be certified by ISO 27001, but WhatsApp has only achieved 53 of the 89 security control points in GB (data from the auditing firm SGS). During the 2024 Kenyan election, criminal gangs used this application to spread malicious software, causing property losses of 2.3 million US dollars.
The effectiveness of the defense mechanism is relatively low. The false alarm rate of the anti-phishing system is 28% (6% for the official version), and the incidence of the two-factor authentication skip vulnerability is 14%. A simulated attack by the Monetary Authority of Singapore revealed that the success rate of BEC (Business Mail Fraud) carried out through WhatsApp GB was 37% higher, with an average loss of 45,000 US dollars.
If necessary, strictly implementing local controls can reduce risks: daily backup of encrypted files (AES-256) reduces the probability of leakage to 0.8%, disabling cloud synchronization reduces the external attack surface by 92%, and configuring firewall rules at the network layer to intercept traffic from unconventional ports (efficiency 99%). However, the global security trends in 2025 show that 86% of enterprises explicitly prohibit the use of WhatsApp GB in business environments, and fines for compliance violations can reach 4% of the operating budget.
