Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Posted on April 1, 2026 By CWS

Microsoft has raised concerns over a recent malware campaign that exploits WhatsApp messages to distribute harmful Visual Basic Script (VBS) files. This malicious activity, observed since late February 2026, employs these scripts to initiate a complex infection chain designed to establish persistence and allow remote control of the affected systems. However, the specific tactics used by the attackers to entice users into running these scripts remain unclear.

Exploitation Techniques and Delivery Methods

The campaign utilizes a blend of social engineering and ‘living-off-the-land’ strategies, according to the Microsoft Defender Security Research Team. By repurposing Windows utilities and retrieving payloads from reputable cloud services like AWS, Tencent Cloud, and Backblaze B2, the attackers maintain a low profile and enhance their chances of a successful breach. The malware is disseminated through WhatsApp messages, which upon execution, create concealed directories and deploy renamed Windows utilities such as ‘curl.exe’ and ‘bitsadmin.exe’ under different aliases.

Gaining System Control and Persistence

After initial access is secured, the attackers strive to sustain their presence and elevate privileges by installing harmful Microsoft Installer (MSI) packages. They accomplish this by downloading additional VBS scripts from cloud platforms using the renamed utilities. Microsoft notes that the malware then tampers with User Account Control (UAC) settings to undermine system defenses, launching ‘cmd.exe’ with elevated privileges persistently until successful UAC elevation or process termination.

Registry entries are modified to embed persistence mechanisms, ensuring the malware survives system reboots. This allows attackers to gain elevated privileges without user interaction by combining registry manipulation with UAC bypass methods, ultimately deploying unsigned MSI installers. Tools like AnyDesk may be utilized for maintaining remote access, facilitating data exfiltration or further malware deployment.

Analysis of the Threat’s Impact

This campaign showcases a sophisticated infection methodology that blends social engineering via WhatsApp, stealth tactics such as using renamed legitimate tools, and cloud-hosted payloads. The strategic use of legitimate tools and trusted platforms enables attackers to merge seamlessly with routine network activities, significantly increasing the likelihood of a successful breach.

The implications of such attacks are profound, as they allow unauthorized remote access and data theft, posing a severe threat to system integrity and user privacy. Vigilance and robust security measures are essential to mitigate such risks, emphasizing the need for user awareness and proactive defense strategies.

Microsoft’s findings underscore the importance of staying informed about emerging threats and implementing comprehensive security protocols to protect against evolving cyberattacks.

The Hacker News Tags:Cybersecurity, Malware, Microsoft, remote access, security threat, social engineering, UAC bypass, VBS files, Visual Basic Script, WhatsApp

Post navigation

Previous Post: Critical Flaw in Google Cloud Vertex AI Exposes Data
Next Post: Chrome Update Fixes Zero-Day Among 21 Vulnerabilities

Related Posts

How to Automate CVE and Vulnerability Advisory Response with Tines How to Automate CVE and Vulnerability Advisory Response with Tines The Hacker News
ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent The Hacker News
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update The Hacker News
Apple Blocks  Billion in Fraud Over 5 Years Amid Rising App Store Threats Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats The Hacker News
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution The Hacker News
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hasbro Faces Cyberattack Disrupting Operations
  • Dynamic PDF Phishing Threatens Latin America and Europe
  • Hackers Exploit Critical WebLogic RCE Flaw Rapidly
  • Chrome Update Fixes Zero-Day Among 21 Vulnerabilities
  • Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hasbro Faces Cyberattack Disrupting Operations
  • Dynamic PDF Phishing Threatens Latin America and Europe
  • Hackers Exploit Critical WebLogic RCE Flaw Rapidly
  • Chrome Update Fixes Zero-Day Among 21 Vulnerabilities
  • Microsoft Alerts on WhatsApp Malware Using UAC Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark