WhatsApp Launches Ads In Status, Adds Paid Channel Features - 1

Image by lonely blue, from Unsplash

WhatsApp Launches Ads In Status, Adds Paid Channel Features

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

The messaging app WhatsApp has introduced advertising for the first time through its “Updates” section, which contains Status and Channels features.

In a rush? Here are the quick facts:

  • WhatsApp will show ads in the Status section of the Updates tab.
  • Ads won’t appear in personal messages, calls, or group chats.
  • Channel subscriptions allow creators to offer updates.

The advertising system will not interrupt personal chat conversations. The ads will appear exclusively within the Updates tab. “We will never sell or share your phone number to advertisers,” the company said. It added that messages, calls, and group chats remain end-to-end encrypted and will not be used to personalize ads.

Meta says that the advertising system will use limited user information, including location and language, together with your channel preferences and responses to ads. Users who link their WhatsApp account to Meta’s Account Center will see ads based on their preferences across Meta platforms.

“[The new ads and promotion products] felt like the next natural evolution,” said Alice Newton-Rex, VP of Product at WhatsApp, as reported by TechCrunch . “Both those businesses have scaled to help people discover businesses directly within WhatsApp,” she added.

Alongside ads, the platform introduces two new features, which include promoted channels, and channel subscriptions. Businesses, together with creators, can now pay to promote their channels in the Explore section. Additionally, the platform will enable selected channels to receive monthly subscription fees for premium content through app store payment systems.

The company says this expansion helps businesses connect with users without disrupting private conversations. These updates will be introduced globally in the coming months.

Anubis Ransomware Destroys Files Even After Payment - 2

Image by Josue Valencia, from Unsplash

Anubis Ransomware Destroys Files Even After Payment

  • Written by Kiara Fabbri Former Tech News Writer
  • Fact-Checked by Sarah Frazier Former Content Manager

A new ransomware group called Anubis is gaining attention for its dangerous double-threat attacks.

In a rush? Here are the quick facts:

  • Anubis ransomware encrypts and permanently wipes files, making recovery impossible.
  • The group offers flexible affiliate programs for cybercriminals.
  • Anubis spreads through phishing emails and uses privilege escalation.

The Anubis ransomware group differs from standard ransomware by including a file-wiping feature, which makes recovery impossible, even when victims pay the ransom.

“Anubis is an emerging Ransomware-as-a-Service (RaaS) operation that combines file encryption with file destruction — a rare dual-threat capability,” researchers at Trend Micro reported.

First spotted in December 2024, when it operated under the Sphinx name. The developers conducted a complete industry-wide attack on healthcare, construction, and engineering sectors across the United States, Canada, Peru, and Australia.

The malware system enters networks through phishing emails, while checking for administrator privileges before proceeding. The malware uses ECIES encryption to lock files, and it also has an optional feature to erase file contents, which results in empty files that cannot be recovered.

The ransom note, titled RESTORE FILES.html , warns victims about data disclosure unless they make a payment. The Anubis logo appears on system wallpapers during attacks, but the modification failed during testing.

Experts say the file-wiping function is especially dangerous. “This destructive tendency adds pressure on victims and raises the stakes of an already damaging attack,” they wrote.

To defend against Anubis, experts recommend backing up data offline, updating software regularly, limiting admin access, and training staff to recognize phishing. Organizations should implement multiple security layers, which include tools that identify suspicious system behavior at an early stage.