Hackers targeted the digital identity of PTI Chairman Barrister Gohar Khan earlier today. This incident of WhatsApp Hijacking Pakistan occurred around 11:00 AM, sparking immediate concerns over privacy. The Chairman confirmed the breach through his official X (formerly Twitter) account shortly after the attack. He subsequently removed the application from his personal smartphone to prevent further unauthorized access.
The attackers did not target the Chairman for direct extortion. Instead, they focused on his extensive contact list to execute a Fraudulent Money Transfer Scam. They sent urgent requests for funds to his close associates and political colleagues. Gohar Khan quickly issued a public warning to neutralize the threat. He urged all his contacts to ignore any financial demands coming from his compromised phone number.
The Mechanics of WhatsApp Hijacking Pakistan
Cybercriminals often use sophisticated social engineering to gain control of high-profile accounts. Once they gain access, they exploit the trust between the account holder and their contacts. This specific breach highlights how even the top leadership remains vulnerable to digital intrusions. You can read more about similar incidents in our Pakistan Cyber Security News category.
Escalating National Security Concerns
This event reflects a broader Digital Security Crisis Pakistan is currently facing. Experts suggest that hackers specifically target politicians and executives due to their high-net-worth circles. The frequency of these attacks has reached an alarming level across the country. Authorities are now investigating the technical footprint left by the perpetrators.
Legal Recourse and New Regulations
The Chairman is currently coordinating with federal agencies to regain his digital security. Many legal experts point toward the PECA Amendment 2025 as a tool for stricter digital enforcement. These laws aim to punish identity theft and financial fraud in the digital space. For more on legal developments, check our Pakistan Legal Updates section.

