Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Posted on April 1, 2026 By CWS

Microsoft has raised concerns over a recent malware campaign that exploits WhatsApp messages to distribute harmful Visual Basic Script (VBS) files. This malicious activity, observed since late February 2026, employs these scripts to initiate a complex infection chain designed to establish persistence and allow remote control of the affected systems. However, the specific tactics used by the attackers to entice users into running these scripts remain unclear.

Exploitation Techniques and Delivery Methods

The campaign utilizes a blend of social engineering and ‘living-off-the-land’ strategies, according to the Microsoft Defender Security Research Team. By repurposing Windows utilities and retrieving payloads from reputable cloud services like AWS, Tencent Cloud, and Backblaze B2, the attackers maintain a low profile and enhance their chances of a successful breach. The malware is disseminated through WhatsApp messages, which upon execution, create concealed directories and deploy renamed Windows utilities such as ‘curl.exe’ and ‘bitsadmin.exe’ under different aliases.

Gaining System Control and Persistence

After initial access is secured, the attackers strive to sustain their presence and elevate privileges by installing harmful Microsoft Installer (MSI) packages. They accomplish this by downloading additional VBS scripts from cloud platforms using the renamed utilities. Microsoft notes that the malware then tampers with User Account Control (UAC) settings to undermine system defenses, launching ‘cmd.exe’ with elevated privileges persistently until successful UAC elevation or process termination.

Registry entries are modified to embed persistence mechanisms, ensuring the malware survives system reboots. This allows attackers to gain elevated privileges without user interaction by combining registry manipulation with UAC bypass methods, ultimately deploying unsigned MSI installers. Tools like AnyDesk may be utilized for maintaining remote access, facilitating data exfiltration or further malware deployment.

Analysis of the Threat’s Impact

This campaign showcases a sophisticated infection methodology that blends social engineering via WhatsApp, stealth tactics such as using renamed legitimate tools, and cloud-hosted payloads. The strategic use of legitimate tools and trusted platforms enables attackers to merge seamlessly with routine network activities, significantly increasing the likelihood of a successful breach.

The implications of such attacks are profound, as they allow unauthorized remote access and data theft, posing a severe threat to system integrity and user privacy. Vigilance and robust security measures are essential to mitigate such risks, emphasizing the need for user awareness and proactive defense strategies.

Microsoft’s findings underscore the importance of staying informed about emerging threats and implementing comprehensive security protocols to protect against evolving cyberattacks.

The Hacker News Tags:Cybersecurity, Malware, Microsoft, remote access, security threat, social engineering, UAC bypass, VBS files, Visual Basic Script, WhatsApp

Post navigation

Previous Post: Critical Flaw in Google Cloud Vertex AI Exposes Data
Next Post: Chrome Update Fixes Zero-Day Among 21 Vulnerabilities

Related Posts

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
A New Maturity Model for Browser Security: Closing the Last-Mile Risk A New Maturity Model for Browser Security: Closing the Last-Mile Risk The Hacker News
Trojan VPNs Spread via SEO Poisoning, Microsoft Warns Trojan VPNs Spread via SEO Poisoning, Microsoft Warns The Hacker News
Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery The Hacker News
Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DeepLoad Malware Spreads via ClickFix Attacks
  • HSBC India Enforces Uppercase-Only Passwords
  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DeepLoad Malware Spreads via ClickFix Attacks
  • HSBC India Enforces Uppercase-Only Passwords
  • Depthfirst Secures $80M in Series B to Enhance AI Security
  • Google Addresses Critical Chrome Zero-Day Vulnerability
  • Russian Hackers Exploit New CTRL Toolkit for RDP Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark