Beware of WhatsApp calls from different country numbers!

Prof. Dr. Burhan Pektaş, who made statements regarding calls from different country numbers that many WhatsApp users have recently encountered, said that there is concrete evidence linking these calls to various fraud and malicious activities. Pektaş also pointed out that the increase in the number of incoming calls could be an indicator of potential security risks, including social engineering attacks and phishing attempts, and stated, “Different security methods can be used to determine whether such calls involve significant risks like unauthorized use of personal data or security breaches. No system can be entirely risk-free. However, with precautions, the likelihood and impact of unauthorized use of personal data or security breaches can be significantly reduced.”

Prof. Dr. Burhan Pektaş, Head of the Bioinformatics Master's Program Department at Üsküdar University's Faculty of Engineering and Natural Sciences, recently made statements regarding the frequent calls WhatsApp users have been receiving from different country numbers.

It is possible to distinguish between unwanted calls and legitimate calls 

Prof. Dr. Burhan Pektaş, evaluating the frequent calls from different country numbers via WhatsApp, said, “To understand call patterns related to frequent calls made from different country numbers via WhatsApp, various data sources such as search engine queries, social media discussions, or online forums can be examined.” 
Pektaş stated that determining the frequency and source of calls requires analyzing call logs and metadata, adding, “WhatsApp itself may not provide detailed information at this level. However, telecommunication service providers can potentially monitor incoming call data, including location information with the country codes of the calling numbers. By examining call logs and their source country codes, we can determine which countries the calls originate from most frequently. A geographical analysis can provide insights into the regions where these calls originate. We can uncover specific patterns related to certain countries or regions. On the other hand, analyzing timestamps and call frequency can also help identify patterns in calls. For example, we might notice that these calls are more common at certain times of the day or occur at specific intervals. Examining call durations, hang-up patterns, or responses allows us to differentiate between unwanted calls, telemarketing, or legitimate calls. Call behavior analysis is essential to fully determine the purpose behind these calls.”

According to concrete evidence, these calls are linked to fraud and malicious activities 

Prof. Dr. Burhan Pektaş stated that calls from different country numbers might serve various purposes such as ‘international communication’, ‘business and customer services’, ‘global marketing and sales’, ‘privacy and security’. However, he added, “There is concrete evidence linking calls from different country numbers to various fraudulent and malicious activities. Scammers often use international numbers to deceive people by impersonating trustworthy institutions and offering fake rewards to obtain sensitive information or money. On the other hand, these individuals may use international numbers to launch phishing attacks, attempting to trick individuals into revealing personal information such as passwords, credit card details, or social security numbers.”
Pektaş also added that callers might use international numbers to mask their true identities and locations, continuing as follows:
“To combat fraud and malicious activities, it is crucial for individuals to be vigilant and cautious when dealing with unknown callers or unwanted communications. Governments and telecommunication providers also play a role in implementing technologies and regulations to detect and block fraudulent calls.”

No system can be completely risk-free, but risks can be reduced with precautions 

Pektaş outlined methods users can benefit from to determine whether such calls involve significant risks like unauthorized use of personal data or security breaches:
- Privacy Impact Assessments (PIAs) help identify and evaluate potential risks to personal data privacy and security. Organizations can conduct these assessments before implementing new calling functionalities or tools that involve processing personal data. 
- Robust logging and monitoring mechanisms can be implemented to track user activity and access to sensitive data. This helps identify suspicious behavior or unauthorized access attempts.
- Ensure that personal data is encrypted both during transmission and storage. This reduces the risk of unauthorized access even if data is intercepted or obtained.
- Implement strict access controls to limit access to personal data only to authorized personnel. This can be achieved through role-based access, multi-factor authentication, and regular access reviews.
- Periodic security assessments and penetration testing can help identify vulnerabilities and weaknesses in the system that could potentially lead to data breaches.
- Collect and store only the minimum amount of personal data necessary for the intended purpose. Reducing the data footprint minimizes the potential impact of a breach.
- Wherever possible, use techniques like anonymization or pseudonymization to protect individual identities while still allowing for data analysis.
- Implement tools and systems that continuously monitor for data leaks on the internet and the dark web. These help determine if personal data has been unlawfully exposed.
Pektaş emphasized that no system can be entirely risk-free, stating, “However, implementing a combination of these measures can significantly reduce the likelihood and impact of unauthorized use of personal data or security breaches.”

It is necessary to be vigilant to protect against evolving security risks 

Prof. Dr. Burhan Pektaş highlighted that the increase in the number of calls from different country numbers could be an indicator of potential security risks, including social engineering attacks and phishing attempts. He warned, “While there is no definitive proof of malicious activity, it should certainly raise concern and prompt you to take precautionary measures. Remember that scammers and attackers constantly adapt their tactics. Therefore, it is necessary to be vigilant to protect against evolving security risks.”
Pektaş concluded by underlining that those who frequently receive calls from different country numbers and suspect any malicious intent should be cautious:
“It is important to be careful during these calls and avoid sharing sensitive information. Scammers often use foreign numbers to make it difficult for you to determine their origin. If you receive a call from an unknown foreign number, consider ignoring it and not answering. Furthermore, you should report the numbers to WhatsApp or local authorities to investigate potential scams or security breaches.”

Üsküdar News Agency (ÜHA)

Share

Update DateFebruary 25, 2026
Creation DateAugust 18, 2023

Request a Call

Phone