
A new SMS phishing campaign in Romania is impersonating FAN Courier, one of the largest courier and express delivery companies, to trick users into entering their WhatsApp verification codes on fake websites.
Once the victim enters the code, attackers take over their WhatsApp account and then send urgent money requests to their contacts. The scam relies on social engineering rather than installing malware.
Cybercriminals have launched a phishing campaign targeting Romanian users by impersonating Fan Courier. Victims receive SMS messages claiming that a parcel is linked to their phone number and that they must choose a locker for pickup, or some variation on the same theme.
The message appears to be routine, mimicking legitimate SMS messages people might receive. The attack uses neutral language and references package delivery, which many people interact with. The page appears to be related to FAN Courier but redirects to a malicious domain controlled by attackers. The immediate objective is WhatsApp account takeover.
The campaign targets Romanian users indiscriminately. Over a million people have received these messages, according to our insights.
Attackers send bulk SMS messages to thousands of phone numbers simultaneously. Anyone expecting a delivery, using locker services, and relying on WhatsApp as a primary communication app can become a victim.
The campaign follows a precise social engineering sequence. First, the victim receives an SMS about a supposed parcel. Some people may actually be waiting for an official message.
The link directs them to a fake website that looks like a delivery confirmation page.

Second, attackers simultaneously initiate a WhatsApp registration attempt using the victim’s phone number. WhatsApp then sends a real verification code to the victim’s device.
The phishing page instructs the victim to enter that code under the pretext of confirming delivery details. When the victim enters the code, the attackers complete the login process on their own device.
At that moment, the attackers have control of the WhatsApp account. There is no malware on the phone, and the victim unknowingly authorizes the takeover.
Once attackers gain access to the account, they move quickly. They use the contact list to send urgent financial requests. Messages often mention temporary emergencies and promise repayment the next day.
Because the requests come from a trusted contact, recipients are more likely to comply without verifying the situation. This second phase generates the financial gain and is the actual goal of the attack.
Legitimate courier services will never ask for WhatsApp login credentials or verification codes. If a website requests your WhatsApp code, it's an account takeover attempt.
Follow these defensive steps:
Re-register your phone number in WhatsApp to attempt account recovery or reinstall the application. Notify your contacts through alternative communication channels. Inform them to ignore any financial requests.
If attackers set a two-step verification PIN before you regain access, recovery may require waiting for WhatsApp’s security reset process.
No. Attackers impersonate the brand. The company itself is a victim of brand abuse.
If they fully hijack your account, they can access ongoing conversations and impersonate you.
No. This attack relies on social engineering and credential theft, not malicious software installation.
Yes. It adds an additional PIN requirement, preventing attackers from completing the registration process.
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all posts