"The bug can be exploited based on a decades-old type of vulnerability - a buffer overflow," Carl Leonard, Principle Security Analyst at cybersecurity company Forcepoint, said in a statement on Wednesday.
"While no details of the actions taken by this malware have emerged, one could assume that an attacker may seek out bulk contact lists, email data, location data or other personal information," Leonard said.
"We are early in our investigation and we don't have numbers to share though this is a relatively small amount of people," said WhatsApp, while urging its 1.5 billion users to update the app.
The company did not immediately share how the attack impacted users in India.
"Unbeknownst to the victims, the attackers obtained complete access to everything on the their mobile devices: personal and corporate information, email, contacts, camera, microphone, and the individual's location," Brian Gleeson, Mobile Product Marketing Manager at Check Point Software Technologies Ltd. wrote in a blog post on Tuesday.
WhatsApp, however, said that earlier this month, it identified and "promptly" fixed the vulnerability that could enable an attacker to insert and execute code on mobile devices.
In fact, according to a report in the Financial Times, the secretive Israeli company called in its sales people last month to talk about its software that can even breach the privacy of iPhone users.
The executives from the NSO Group made a claim that it had figured out a way to "drop its payload", a piece of software called Pegasus that can penetrate the darkest secrets of any iPhone, using just one simple missed call on WhatsApp, said the report citing one unnamed person at the meeting.
The phone starts revealing its encrypted content shortly after the missed call.
"It then transmits back the most intimate details such as private messages or location, and even turns on the camera and microphone to live-stream meetings," said the report.
While the software itself is not new, the WhatsApp hack was an enticing new "attack vector", the person was quoted as saying.
"In order to ensure users are properly protected, a mobile threat defence solution must be in place that can prevent spyware from gathering intelligence on their targets," he added.
(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)