WhatsApp Malware Campaign - New VBS Scripts Exploit Users

Basically, hackers are using WhatsApp to send harmful files that can secretly take over your computer.
A new malware campaign is exploiting WhatsApp to deliver harmful VBS files to Windows users. This stealthy attack can compromise systems without alerting victims. Stay informed and learn how to protect yourself from these threats.
What Happened
A new malware campaign has emerged, leveraging WhatsApp to deliver malicious files directly to Windows users. This attack exploits the trust users place in familiar messaging apps, making it easier for hackers to execute their plans. The campaign employs Visual Basic Script (VBS) files sent through WhatsApp messages, which users often overlook as potential threats.
How It Works
Once a user executes a malicious VBS file, the infection process begins silently. The script creates hidden folders in the system, dropping renamed legitimate Windows tools such as curl.exe and bitsadmin.exe. These tools are disguised to look like standard system files, allowing the malware to blend in with normal operations. The attackers then use these tools to download additional malicious payloads from trusted cloud services like AWS S3 and Backblaze B2.
Who's Being Targeted
This campaign primarily targets Windows users who frequently use WhatsApp. By sending files through a trusted platform, attackers can bypass initial suspicions that users might have about unsolicited attachments. The stealthy nature of the attack makes it particularly dangerous, as it can compromise systems without raising alarms.
Signs of Infection
Users may notice unusual behavior on their systems, such as:
- Hidden folders in
C:\ProgramData - Renamed system files that appear suspicious
- Unexpected prompts requesting elevated privileges
How to Protect Yourself
To safeguard against this attack, consider the following measures:
- Do not open unexpected attachments from WhatsApp, even from known contacts.
- Block script hosts like
wscriptandcscriptfrom untrusted paths. - Monitor traffic to cloud platforms frequently used by attackers.
- Enable Endpoint Detection and Response (EDR) in block mode to catch malicious artifacts.
- Educate users on the risks of opening files from messaging apps.
Conclusion
This malware campaign highlights the evolving tactics of cybercriminals. By exploiting widely used platforms like WhatsApp, attackers can effectively deliver malicious payloads. Users must remain vigilant and adopt proactive security measures to protect their systems from such threats.