top of page

Microsoft Warns of WhatsApp-Delivered VBS Malware with Windows UAC Bypass Vulnerability

  • Apr 2
  • 2 min read

Key Findings


  • New malware campaign since late February 2026 distributes malicious VBS files through WhatsApp messages

  • Attack chain uses renamed Windows utilities and legitimate cloud services to evade detection

  • Malware exploits UAC bypass techniques to gain elevated privileges and install remote access tools like AnyDesk

  • Campaign combines social engineering, living-off-the-land tactics, and registry manipulation for persistence


Background


Microsoft's Defender Security Research Team has identified a coordinated campaign leveraging WhatsApp as a delivery mechanism for malicious Visual Basic Script files. The operation represents a shift in tactics by incorporating trusted messaging platforms and cloud infrastructure to distribute malware while maintaining a low profile in network activity. The threat actors have effectively weaponized legitimate tools and services to increase their chances of successful infection.


Attack Delivery and Initial Compromise


The campaign begins when users receive WhatsApp messages containing malicious VBS files. While the specific social engineering lures remain unknown, victims who execute these scripts trigger the infection chain. Upon execution, the malware creates hidden folders within C:\ProgramData and deploys renamed versions of standard Windows utilities including curl.exe masquerading as netapi.dll and bitsadmin.exe disguised as sc.exe.


Payload Distribution and Privilege Escalation


The malware downloads secondary VBS payloads hosted on trusted cloud platforms including AWS S3, Tencent Cloud, and Backblaze B2. Using the renamed binaries, attackers retrieve these auxiliary files while blending into normal network traffic. The attackers then target the system's User Account Control settings, continuously attempting to launch cmd.exe with elevated privileges through registry manipulation under HKLM\Software\Microsoft\Win until successful elevation is achieved.


Persistence and Remote Access


Once elevated privileges are obtained, the malware deploys unsigned MSI installer packages that establish long-term control. This includes installation of legitimate remote access tools like AnyDesk, granting attackers persistent connectivity to victim systems. The persistence mechanisms ensure the infection survives system reboots, allowing for data exfiltration and deployment of additional malware as needed.


Sources


  • https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html

  • https://x.com/CyberSysblue/status/2039417978777674190

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page