Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
Wednesday, April 22
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Malware Analysis

New WhatsApp Worm Banking Malware Spreads Through Chats

A single message can cost your credentials — stay alert, stay secure
V DiwaharBy V DiwaharOctober 14, 2025Updated:March 24, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

There’s a new cyber threat making the rounds on WhatsApp, and it’s nastier than usual. Security researchers have discovered a WhatsApp Worm Banking Malware that sneaks through chat messages, steals banking information, and even spreads to your friends automatically.

It started in Brazil but is already being watched closely worldwide. The scary part? The attack looks completely normal until it’s too late.

Table of Contents hide
1 How the Infection Starts
2 Why It Spreads So Easily
3 How It Stays Hidden
4 The Layers Behind the Attack
5 How It Steals Your Data
6 Why Brazil Is Being Targeted
7 Who Might Be Behind It
8 How to Protect Yourself
9 Red Flags to Look For
10 How Experts Are Fighting Back
11 Final thoughts

How the Infection Starts

Everything begins with what looks like an innocent message on WhatsApp Web. You might get a note from someone you know, sharing a ZIP file and saying it must be opened on a computer. Since it comes from a real contact, most people don’t think twice.

Once that file is unzipped, though, it quietly runs a Windows shortcut that fires up a hidden PowerShell script. That script reaches out to remote servers and starts pulling down more malware.

Why It Spreads So Easily

This worm relies on one thing — trust. Because it uses your own WhatsApp account to send messages to friends, it feels legitimate. After infecting a new system, it automatically forwards the same ZIP file to all of your contacts. Within hours, entire groups or office networks can be hit. It’s social engineering at its best — or worst, depending on how you look at it.

New WhatsApp Worm Banking Malware Spreads Through Chats
(Source – Sophos)

How It Stays Hidden

Researchers say this malware is unusually advanced for something spreading on a chat app. The PowerShell code is disguised so that security software can’t recognize it easily.

It even changes a few Windows security settings, turning off things like User Account Control and creating exclusions in Microsoft Defender. These tweaks let the malware work quietly in the background without showing pop-ups or warnings.

The Layers Behind the Attack

This infection doesn’t just drop one file and disappear — it comes in stages.

  1. The victim opens the ZIP file and triggers a hidden PowerShell command.
  2. The command connects to websites such as zapgrande[.]com and sorvetenopote[.]com to fetch more code.
  3. Depending on what system it finds, it installs either a browser automation tool or a banking trojan called Maverick.

That combination lets it both spread further and start stealing sensitive information at the same time.

New WhatsApp Worm Banking Malware Spreads Through Chats
(Source – Sophos)

How It Steals Your Data

Once active, the Maverick trojan watches your web browser. When you log into a bank account or crypto exchange, it quietly captures usernames, passwords, and tokens.

The other payload, which uses Selenium automation, takes control of your WhatsApp Web session to send more messages on its own. Basically, it turns your computer into a delivery system for the next attack.

Why Brazil Is Being Targeted

Most of the early infections have shown up in Brazil. The comments in the code and the list of banking websites being monitored point directly to that region. Local cybersecurity firms say over 400 companies and 1,000 computers have already been affected. Since Brazilian banks rely heavily on online transactions, the payoff for the attackers can be huge.

Who Might Be Behind It

Experts from Sophos believe the attackers are well-organized and have strong technical backgrounds. They understand Windows internals, PowerShell scripting, and browser automation. The way the malware avoids detection and controls multiple payloads at once suggests that this isn’t a beginner’s project — it’s likely backed by an experienced cybercrime group that focuses on financial theft.

How to Protect Yourself

1. Don’t open strange attachments

If someone sends a ZIP file through WhatsApp, double-check before opening it — even if it’s a friend. Hackers depend on that trust.

2. Keep everything updated

Install updates for Windows, PowerShell, and your antivirus software. Most worms succeed because systems are outdated.

3. Turn on multi-factor authentication

Use MFA for your banking and crypto accounts. It adds a second lock, even if your password gets stolen.

4. Watch for odd behavior

Slow performance, unexpected PowerShell windows, or disabled antivirus tools are warning signs that something’s off.

5. Learn and share

Teach your coworkers and family about these scams. Awareness is often the best defense.

Red Flags to Look For

  • Messages you never sent appearing in WhatsApp chats.
  • Security tools like Microsoft Defender suddenly turned off.
  • Connections to unknown domains.
  • Pop-ups asking for extra permissions when opening files.

If you see any of these, unplug from the internet and run a full system scan right away.

How Experts Are Fighting Back

Teams from Sophos, Kaspersky, and other cybersecurity firms are tracing the servers and code patterns behind the WhatsApp Worm Banking Malware. They’re sharing threat indicators so companies can block the related domains. Security analysts also recommend limiting PowerShell access, using EDR tools, and educating users to avoid suspicious links.

Final thoughts

The WhatsApp Worm Banking Malware is proof that cybercriminals are getting better at mixing social tricks with technical skill. By turning trusted chat app into a delivery system, they’ve created a threat that feels almost personal.

Staying safe now means slowing down, thinking twice before opening files, and keeping your system patched. The more cautious we are today, the fewer victims there will be tomorrow.

Related posts:

  1. What Are Rootkits? A Simple Guide to Detecting and Removing Them in 2026
  2. Understanding Botnets: How They Operate and Their Threats
  3. What Are Zero-Day Attacks and How Can Protect Yourself
  4. LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleCybersecurity Newsletter Weekly – October 6 -12, 2025
Next Article Over 100 VS Code Extensions Exposed: Major Security Risks Threaten Developers Worldwide
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026
Read More

LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026

January 21, 2026
Read More

Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users

January 7, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks

April 13, 2026

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.