So, from the script in the link.
The attacker persuades the victim to call the
**67*<10-digit-number>
or
*405*<10-digit-number>
where <10-digit-number> is the number under the attacker's control.
Attacker requests whatsapp registration with a call, and catches the forwarded voice code to his <10-digit-number>, logs into his account, after which we are trivially thrown out of the account.
Pretty simple scheme, but there are a couple of inaccuracies:
**<some digits>*<10-digit-number> #
Well, first of all, it's never a good idea to call someone else's number. It's a scam 99% of the time, and the remaining 1% of the time the problem can probably be solved in another way. Social engineering attacks are always designed to be rushed: "quick/urgent/life-and-death". Just give yourself a couple of minutes to think about it, and we will probably end up laughing at the absurdity of such a request/request.
Second, it makes sense to enable 2-factor authentication wherever it can be enabled (not just in whatsapp). This may sound like agitation (similar to complex passwords), but in practice it really is a very effective way to protect your accounts.