WhatsApp Malware - Campaign Delivers VBS Payloads and MSI Backdoors

Basically, a malware campaign uses WhatsApp to send harmful files that take control of your computer.
A new malware campaign exploits WhatsApp to deliver harmful VBS scripts. This attack targets users and organizations, compromising systems and maintaining access. Stay vigilant and protect your devices.
What Happened
In late February 2026, a sophisticated malware campaign emerged, utilizing WhatsApp messages to deliver malicious Visual Basic Script (VBS) files. These scripts initiate a multi-stage infection chain, designed to establish persistence and enable remote access to compromised systems. By exploiting the trust users have in familiar communication platforms, attackers effectively bypass initial defenses.
The campaign employs a combination of social engineering and living-off-the-land techniques. Attackers rename legitimate Windows tools to blend into normal system activity, and they retrieve payloads from trusted cloud services like AWS and Tencent Cloud. This method reduces visibility and increases the likelihood of successful execution, making it a concerning trend in cybercrime.
Who's Being Targeted
The primary targets of this malware campaign are individuals and organizations that use WhatsApp for communication. By leveraging a widely used platform, attackers can reach a broad audience. Victims may not suspect malicious intent when receiving messages from familiar contacts, making them more likely to execute the harmful scripts.
Once the VBS files are executed, the malware creates hidden folders in the system, dropping renamed versions of legitimate Windows utilities. This tactic ensures that malicious activities blend seamlessly with normal operations, complicating detection efforts for security solutions.
Signs of Infection
Indicators of infection include unexpected changes in system behavior, such as the presence of hidden folders in C:\ProgramData and the execution of renamed Windows utilities like curl.exe and bitsadmin.exe. Users may notice unusual network activity as the malware downloads additional payloads from cloud services.
Furthermore, the malware attempts to tamper with User Account Control (UAC) settings, which could manifest as unexpected prompts or system behavior. Monitoring registry changes and unusual command line flags can help identify potential infections before they escalate.
How to Protect Yourself
To defend against this malware campaign, organizations should implement several key strategies. First, they should strengthen endpoint controls by blocking or restricting the execution of script hosts in untrusted paths. Monitoring for renamed or hidden Windows utilities is crucial for early detection.
Additionally, enhancing cloud traffic monitoring can help identify malicious payload downloads, even when hosted on trusted platforms. Educating users about the risks of social engineering and suspicious WhatsApp attachments can further reduce the likelihood of successful attacks. By combining these measures, organizations can better protect themselves against evolving malware threats.