Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

Posted on October 20, 2025October 20, 2025 By CWS

Oct 20, 2025Ravie LakshmananBrowser Safety / Malware
Cybersecurity researchers have uncovered a coordinated marketing campaign that leveraged 131 rebranded clones of a WhatsApp Internet automation extension for Google Chrome to spam Brazilian customers at scale.
The 131 spamware extensions share the identical codebase, design patterns, and infrastructure, in response to provide chain safety firm Socket. The browser add-ons collectively have about 20,905 lively customers.
“They aren’t basic malware, however they perform as high-risk spam automation that abuses platform guidelines,” safety researcher Kirill Boychenko stated. “The code injects instantly into the WhatsApp Internet web page, working alongside WhatsApp’s personal scripts, automates bulk outreach and scheduling in ways in which intention to bypass WhatsApp’s anti-spam enforcement.”
The top purpose of the marketing campaign is to blast outbound messaging through WhatsApp in a fashion that bypasses the messaging platform’s fee limits and anti-spam controls.

The exercise is assessed to have been ongoing for a minimum of 9 months, with new uploads and model updates to the extensions noticed as not too long ago as October 17, 2025. A few of the recognized extensions are listed under –

YouSeller (10,000 customers)
performancemais (239 customers)
Botflow (38 customers)
ZapVende (32 customers)

The extensions have been discovered to embrace completely different names and logos, however, behind the scenes, the overwhelming majority of them have been printed by “WL Extensão” and its variant “WLExtensao.” It is believed that the variations in branding are the results of a franchise mannequin that permits the operation’s associates to flood the Chrome Internet Retailer with numerous clones of the unique extension provided by an organization named DBX Tecnologia.

These add-ons additionally declare to masquerade as buyer relationship administration (CRM) instruments for WhatsApp, permitting customers to maximise their gross sales by way of the net model of the appliance.
“Flip your WhatsApp into a robust gross sales and make contact with administration instrument. With Zap Vende, you will have an intuitive CRM, message automation, bulk messaging, visible gross sales funnel, and way more,” reads the outline of ZapVende on the Chrome Internet Retailer. “Manage your customer support, observe leads, and schedule messages in a sensible and environment friendly method.”
DBX Tecnologia, per Socket, advertises a reseller white-label program to permit potential companions to rebrand and promote its WhatsApp Internet extension below their very own model, promising recurring income within the vary of R$30,000 to R$84,000 by investing R$12,000.

It is value noting that the follow is in violation of Google’s Chrome Internet Retailer Spam and Abuse coverage, which bans builders and their associates from submitting a number of extensions that present duplicate performance on the platform. DBX Tecnologia has additionally been discovered to have put out YouTube movies about bypassing WhatsApp’s anti-spam algorithms when utilizing the extensions.
“The cluster consists of near-identical copies unfold throughout writer accounts, is marketed for bulk unsolicited outreach, and automates message sending inside net.whatsapp.com with out consumer affirmation,” Boychenko famous. “The purpose is to maintain bulk campaigns working whereas evading anti-spam methods.”
The disclosure comes as Development Micro, Sophos, and Kaspersky make clear a large-scale marketing campaign that is focusing on Brazilian customers with a WhatsApp worm dubbed SORVEPOTEL that is used to distribute a banking trojan codenamed Maverick.

The Hacker News Tags:Campaign, Caught, Chrome, Extensions, Hijacking, Massive, Spam, Web, WhatsApp

Post navigation

Previous Post: Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks
Next Post: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

Related Posts

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation The Hacker News
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks The Hacker News
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks The Hacker News
Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys The Hacker News
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves The Hacker News
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark