Microsoft has issued a critical warning regarding a sophisticated new malware campaign that is utilizing the WhatsApp messaging platform as its primary delivery mechanism. The campaign, first observed in late February 2026, involves the distribution of malicious Visual Basic Script (VBS) files designed to execute a multi-stage infection chain. The ultimate objectives are to establish persistent control over compromised Windows systems and enable unfettered remote access for threat actors. A particularly concerning aspect of this attack is its use of a User Account Control (UAC) bypass technique, which allows the malware to execute with elevated privileges without triggering standard security prompts, thereby significantly enhancing its stealth and destructive potential.
The infection process begins when a target receives a seemingly legitimate WhatsApp message containing a VBS file attachment. While the specific social engineering lures used to entice users into opening the file remain unclear, typical tactics in such campaigns include impersonating trusted contacts, sending fake invoices, or masquerading as critical security updates. Once the user executes the VBS script, it initiates a complex sequence of events. The script is engineered to bypass Windows UAC protections, a critical security feature designed to prevent unauthorized changes. This bypass is a cornerstone of the attack, granting the malware administrative rights to disable security software, manipulate system settings, and embed itself deeply within the operating system.
Following the initial execution and privilege escalation, the VBS script proceeds to download and deploy additional payloads from attacker-controlled servers. This multi-stage approach allows the threat actors to maintain flexibility, potentially delivering a range of malicious tools such as remote access trojans (RATs), information stealers, or ransomware modules. The establishment of persistence is a key focus, achieved through mechanisms like creating scheduled tasks, modifying registry run keys, or installing rogue services. This ensures the malware survives system reboots and remains active, providing a continuous backdoor for data exfiltration, surveillance, or further network penetration.
The emergence of this campaign underscores several evolving threats in the cybersecurity landscape. First, it highlights the continued weaponization of legitimate, ubiquitous communication platforms like WhatsApp, which users inherently trust, making them highly effective attack vectors. Second, the use of VBS scripts demonstrates that older, seemingly less sophisticated technologies can still be potent when combined with modern evasion techniques like UAC bypass. For defenders, this incident reinforces the need for layered security strategies that include application whitelisting, behavior-based detection to catch privilege escalation attempts, and comprehensive user awareness training to recognize social engineering tactics, regardless of the communication channel used.



