radar

ONE Sentinel

securitySecurity/M365 SECURITY/HIGH

WhatsApp malware campaign delivers VBS payloads and MSI backdoors

sourceMicrosoft Security Blog
calendar_todayMarch 31, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

WhatsApp Malware Campaign Unleashes VBS Payloads and MSI Backdoors

Summary

A recent malware campaign is exploiting WhatsApp messages to distribute VBS scripts that trigger a multi-stage infection process. This attack uses renamed Windows tools and cloud-hosted payloads to deploy MSI backdoors, allowing persistent access to infected systems.

Key Points

  • The malware campaign utilizes WhatsApp messages as the delivery mechanism for malicious VBS scripts.
  • The infection chain is multi-stage, indicating a sophisticated attack strategy.
  • Renamed Windows tools are employed to evade detection and facilitate the attack.
  • Cloud-hosted payloads are used to install MSI backdoors on compromised systems.
  • The campaign aims to maintain persistent access to the infected systems.

Analysis

This campaign highlights the evolving tactics of cybercriminals who are leveraging popular communication platforms like WhatsApp to distribute malware. By using renamed Windows tools and cloud-hosted payloads, attackers can bypass traditional security measures, making this a significant threat to organizations. The use of MSI backdoors suggests a focus on long-term access and potential data exfiltration.

Conclusion

IT professionals should enhance their security protocols by monitoring for unusual use of Windows tools and scrutinizing cloud-hosted payloads. Regular updates to security systems and employee training on recognizing phishing attempts can mitigate the risks associated with such sophisticated malware campaigns.