Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
Home/Threats/WhatsApp Attack Chain Uses VBS, Cloud, & MSI Back Scripts Downloads
Threats

WhatsApp Attack Chain Uses VBS, Cloud, & MSI Back Scripts Downloads

A novel malware campaign is actively leveraging WhatsApp to deliver malicious files, primarily targeting Windows users. This sophisticated attack chain exploits the inherent trust users place in...

Marcus Rodriguez
Marcus Rodriguez
April 2, 2026 4 Min Read
2 0

A novel malware campaign is actively leveraging WhatsApp to deliver malicious files, primarily targeting Windows users. This sophisticated attack chain exploits the inherent trust users place in everyday messaging applications, as detailed in a recent security analysis. Threat actors employ a multi-stage infection process, beginning with VBS scripts for initial compromise. This is followed by cloud-based downloads for additional payloads and culminates in the installation of

The threat actors send malicious Visual Basic Script (VBS) files through WhatsApp messages, knowing that users rarely question attachments from familiar platforms.

Once a recipient runs one of these files, a silent infection process takes hold in the background, with no visible warning to alert the user.

This campaign stands out because of how cleverly it hides within a normal operating environment. The attackers use “living-off-the-land” techniques — a method where threat actors rely on tools that Windows already has, instead of bringing in unfamiliar programs.

Legitimate utilities like curl.exe and bitsadmin.exe are renamed to look like standard system files, then planted inside hidden folders in C:ProgramData.

Secondary payloads are then fetched from trusted cloud services such as AWS S3, Tencent Cloud, and Backblaze B2, making the malicious downloads appear as routine system traffic.

The Microsoft Defender Security Research Team first identified this campaign in late February 2026.

Researchers noted that the operation combines social engineering with stealth-based infection techniques, working through multiple stages to install malicious MSI packages, maintain persistence across system reboots, and open remote access channels that give attackers full, ongoing control over any machine they successfully compromise.

The campaign ultimately delivers a set of unsigned MSI installer packages, including Setup.msi, WinRAR.msi, LinkPoint.msi, and AnyDesk.msi.

The absence of a valid code-signing certificate on all four files is a clear warning sign, since legitimate enterprise software typically carries a trusted publisher signature.

Infection chain illustrating the execution flow of a VBS-based malware campaign (Source - Microsoft)
Infection chain illustrating the execution flow of a VBS-based malware campaign (Source – Microsoft)

Once these installers run, they establish persistent remote access, giving attackers the ability to steal data, deploy additional malware, or use the compromised system as part of a broader attack operation.

How the Attack Unfolds: From VBS to Full System Compromise

The attack begins when a user executes the malicious VBS file received through WhatsApp. The script immediately creates hidden folders inside C:ProgramData and drops renamed versions of legitimate Windows tools — curl.exe becomes netapi.dll, and bitsadmin.exe is disguised as sc.exe.

Despite the name changes, both files still carry their original PE metadata, specifically the OriginalFileName field. This mismatch between the visible name and the embedded metadata is a detectable signal that security tools can use to flag the threat.

Next-stage payload retrieval mechanism (Source - Microsoft)
Next-stage payload retrieval mechanism (Source – Microsoft)

Those renamed tools then download secondary VBS payloads from cloud-hosted attacker infrastructure, including files named auxs.vbs and WinUpdate_KB5034231.vbs.

Hosting these files on well-known platforms like AWS S3 and Backblaze B2 is a deliberate move, as corporate firewalls rarely block traffic to these services.

The file names are also crafted to resemble legitimate Windows update packages, reducing the chance that anyone will notice the downloads or question their origin.

Once the secondary scripts land on the system, the malware begins tampering with User Account Control (UAC) settings.

It continuously attempts to run cmd.exe with elevated privileges, modifying registry entries under HKLMSoftwareMicrosoftWin until administrative rights are secured.

With those rights in hand, it suppresses security prompts entirely, ensuring that the final MSI installers run without triggering any alerts or interruptions that might tip off the user or an IT administrator.

Illustration of UAC bypass attempts employed by the malware (Source - Microsoft)
Illustration of UAC bypass attempts employed by the malware (Source – Microsoft)

Microsoft recommends that organizations block script hosts such as wscript and cscript from running in untrusted paths, and monitor for renamed Windows utilities executing with uncommon command-line flags.

Security teams should inspect and filter traffic to cloud platforms like AWS S3, Tencent Cloud, and Backblaze B2, since attackers rely on these services to deliver secondary payloads undetected.

Registry changes under HKLMSoftwareMicrosoftWin must be tracked in real time, and any repeated UAC tampering should be flagged as an active indicator of compromise.

Enabling EDR in block mode stops malicious artifacts even if the primary antivirus solution misses them, while turning on tamper protection prevents attackers from disabling security services post-compromise.

Configuring attack surface reduction rules to block VBScript from launching downloaded executables adds a further critical layer.

Training end users to question unexpected WhatsApp attachments — even from known contacts — remains one of the most direct ways to stop this attack before it begins.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Critical Cisco IMC Flaw Allows Attackers to Bypass Authentication

Next Post

TA416 Expands Espionage Operations Across Europe With Web Bug

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
WatchGuard Agent Flaws Grant Full SYSTEM Privileges on
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us