Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware

Posted on November 20, 2025November 20, 2025 By CWS

Trustwave SpiderLabs researchers have recognized a complicated banking trojan referred to as Eternidade Stealer that spreads by means of WhatsApp hijacking and social engineering ways.

The malware, written in Delphi, represents a major evolution in Brazil’s cybercriminal panorama, combining superior contact harvesting with credential theft focusing on monetary establishments.

The risk emerges from a multi-stage an infection chain that begins with an obfuscated VBScript despatched by way of WhatsApp messages.

The message obtained by way of WhatsApp throughout the preparation of the present report (Supply – Trustwave)

When executed, the script downloads a batch file containing two major payloads: a Python-based WhatsApp worm and an MSI installer that deploys the banking trojan.

This distribution methodology exploits the messaging platform’s trusted nature, making customers extra prone to work together with malicious attachments shared by contacts whose accounts have been compromised.

Trustwave safety analysts famous that the malware demonstrates outstanding sophistication in focusing on Brazilian victims particularly.

The trojan makes use of geolocation checks to confirm the working system language is Brazilian Portuguese earlier than continuing with an infection.

If the system language doesn’t match, the malware shows an error message and terminates, stopping unintended infections outdoors its meant goal area and avoiding sandbox detection.

The core performance of Eternidade Stealer entails stealing whole WhatsApp contact lists by means of the obter_contatos() operate, which executes JavaScript code utilizing the WPP.contact.record() API.

The malware intelligently filters out teams, enterprise contacts, and broadcast lists, focusing particularly on particular person private contacts extra prone to fall sufferer to phishing messages.

Every stolen contact file consists of the total WhatsApp ID, contact identify, telephone quantity, and whether or not the contact is saved.

Eternidade Stealer’s assault chain (Supply – Trustwave)

After assortment, the malware instantly sends this knowledge to the command-and-control server by way of HTTP POST requests with out consumer interplay.

What makes Eternidade Stealer notably harmful is its dual-layer persistence mechanism. The trojan makes use of hardcoded credentials to attach by way of IMAP to an e-mail account managed by risk actors.

It extracts the command-and-control server deal with from e-mail topics and our bodies, permitting attackers to replace their infrastructure dynamically and preserve connections even when particular domains are seized.

The malware targets over 40 Brazilian monetary establishments, cost companies like MercadoPago, and cryptocurrency exchanges, together with Binance and Coinbase.

When a sufferer accesses a focused banking software, the trojan prompts its overlay functionality, displaying faux login screens designed to steal credentials seamlessly.

System reconnaissance capabilities accumulate data, together with OS particulars, put in antivirus software program, public and native IP addresses, and working processes.

This reconnaissance helps risk actors decide whether or not to proceed with credential theft or banking overlay deployment.

The investigation revealed that one risk actor’s infrastructure recorded 454 connection makes an attempt globally, with vital site visitors from the US and European nations, suggesting broader assault ambitions past Brazil’s borders.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attack, Contacts, Deploys, Exfiltrate, Malware, Server, WhatsApp

Post navigation

Previous Post: US and Allies Sanction Russian Bulletproof Hosting Service Providers
Next Post: Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide

Related Posts

Blockchain Security – Protecting Decentralized Applications Cyber Security News
Hackers Abusing GitHub Notifications to Deliver Phishing Emails Cyber Security News
Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data Cyber Security News
Police Body Camera Apps Sending Data to Cloud Servers Hosted in China Via TLS Port 9091 Cyber Security News
Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark