La Era
Apr 16, 2026 · Updated 08:38 AM UTC
Cybersecurity

Microsoft Warns of WhatsApp Campaign Delivering Malicious MSI Packages

Cybercriminals are using social engineering on WhatsApp to deploy malicious Microsoft Installer packages. The attack allows remote control of victim machines and full data access through a multi-stage execution chain.

Isabel Moreno

2 min read

Microsoft Warns of WhatsApp Campaign Delivering Malicious MSI Packages
AI-generated illustration

Microsoft researchers identified a sophisticated cyberattack campaign beginning in late February 2026 that uses WhatsApp to deliver malicious software. The attack chain utilizes social engineering to trick users into executing Visual Basic Script (VBS) files, which eventually grant criminals full remote control over infected machines. This campaign targets users globally by exploiting trust within messaging platforms to bypass traditional security perceptions.

Execution of 'Living off the Land' Techniques

The attack begins when a recipient opens a malicious file, likely sent from a compromised contact or via an urgent lure. Once executed, the script creates hidden folders in the system directory and deploys renamed versions of legitimate Windows utilities, such as curl.exe and bitsadmin.exe. By renaming these binaries to appear as system files, attackers attempt to blend in with normal network activity to avoid detection.

However, Microsoft noted a critical error in the attackers' methodology regarding file metadata. The renamed binaries retain their original Portable Executable metadata, which allows security software to identify the discrepancy between the filename and the internal identity. This flaw provides a primary detection signal for tools like Microsoft Defender to flag the activity as malicious.

Deployment of Remote Access Tools

Following the initial breach, the malware downloads secondary payloads from trusted cloud providers, including Amazon Web Services (AWS), Tencent Cloud, and Backblaze B2. The attackers then attempt to elevate system privileges by altering User Account Control settings to ensure the malware survives a system reboot. This stage is critical for maintaining long-term persistence on the victim's hardware.

In the final stage, the criminals deploy malicious MSI installers disguised as common software such as WinRAR and AnyDesk. These installers are unsigned, which serves as a further warning sign for security administrators. Once installed, these tools allow attackers to steal sensitive data or deploy more destructive software, including ransomware.

"Train employees to recognize suspicious WhatsApp attachments and unexpected messages, reinforcing that even familiar platforms can be exploited for malware delivery," Microsoft advised in a recent blog post.

Broader Cybersecurity Implications

This campaign highlights a growing trend in "living off the land" attacks, where legitimate system tools are weaponized to evade antivirus software. Unlike custom malware, which often triggers immediate alerts, the use of signed cloud services and standard Windows utilities makes attribution and detection more difficult for enterprise security teams. This shift forces a move toward behavioral analysis rather than simple file scanning.

Organizations must now view encrypted messaging apps not just as communication tools, but as primary attack vectors for corporate espionage and data theft. The reliance on social engineering suggests that technical barriers are becoming less effective than human psychology. Future defenses will likely require a combination of stricter endpoint detection and continuous employee security training.

Comments

Comments are stored locally in your browser.