WhatsApp Malware - New Campaign Uses VBS Files for Access

Basically, hackers trick WhatsApp users into running harmful files that let them control their devices remotely.
A new malware campaign is targeting WhatsApp users with malicious VBS files. This attack enables persistent access and remote control of infected devices. Microsoft warns users to be cautious and monitor their systems for suspicious activity.
What Happened
Microsoft has issued a warning about a new malware campaign targeting WhatsApp users. This campaign involves the distribution of malicious Visual Basic Script (VBS) files. Attackers have been using social engineering tactics to trick users into executing these files since at least late February. Once the scripts are launched, they initiate a multi-stage infection flow that blends into normal system activity, allowing attackers to pull additional payloads for remote control.
The campaign leverages a combination of living-off-the-land (LOTL) techniques and trusted Windows utilities. By using legitimate tools and platforms, attackers can evade detection and increase the chances of successful execution. This strategy makes it difficult for users and security solutions to identify malicious activity.
Who's Being Targeted
The primary targets of this campaign are WhatsApp users who may receive messages containing the malicious VBS files. These files are disguised as legitimate content, making it easy for unsuspecting users to execute them. Once executed, the scripts create hidden directories on the system, setting the stage for further compromise.
The attackers take advantage of the trust users have in WhatsApp, a widely used messaging platform. This trust, combined with the social engineering tactics employed, significantly increases the likelihood that users will fall victim to the attack.
Signs of Infection
Once the VBS files are executed, users may not immediately notice anything suspicious. The malware operates in the background, utilizing renamed versions of legitimate Windows utilities like curl.exe and bitsadmin.exe. These disguised binaries perform malicious tasks while blending into the environment, making detection challenging.
As the infection progresses, the attackers deploy Microsoft Installer (MSI) packages to maintain control over the infected devices. These packages are not typically flagged as suspicious, allowing the attackers to execute custom actions during installation. Users may only realize something is wrong if they notice unusual behavior or performance issues with their devices.
How to Protect Yourself
To safeguard against this malware campaign, users should be vigilant about the files they execute, especially those received through messaging platforms like WhatsApp. Here are some recommended actions:
- Monitor script and installer execution: Keep an eye on any scripts or installers running on your device, especially those from untrusted sources.
- Watch for misuse of legitimate tools: Be cautious of any unexpected behavior from trusted utilities on your system.
- Track suspicious activity: Regularly check for unusual activity tied to files delivered through messaging platforms.
By staying informed and cautious, users can better protect themselves from this evolving threat.