Microsoft's cybersecurity researchers have uncovered a sophisticated malware campaign exploiting the trust associated with WhatsApp communications to deliver malicious VBScript files and MSI installer packages. The attackers initiate contact by sending a seemingly innocuous WhatsApp message, often posing as a known contact or a service representative. The message typically contains a lure, such as a fake invitation to a meeting or an urgent document, which directs the target to a compromised or attacker-controlled website. This initial social engineering step is critical, as it bypasses technical controls by exploiting human curiosity and the implicit trust in a familiar messaging platform.
Upon visiting the malicious link, the victim is prompted to download a file. The primary payload is often a Visual Basic Script (VBS) file, a legitimate Windows scripting language frequently abused by threat actors for its system-level access and ability to execute commands. This VBS script acts as a downloader, fetching and executing the next stage of the attack. In parallel or as a follow-up, the campaign deploys a malicious Microsoft Software Installer (MSI) package. MSI files are particularly dangerous as they are trusted system files designed for software installation, often allowing them to bypass basic security warnings and execute with elevated privileges, facilitating deep system persistence.
The final payload of this multi-stage attack is a powerful backdoor, granting the attackers remote access to the compromised system. Once installed, this backdoor can exfiltrate sensitive data, deploy additional malware such as ransomware or spyware, and provide a foothold for lateral movement within a corporate network. Microsoft attributes this campaign to a financially motivated threat actor, highlighting the ongoing evolution of social engineering tactics that blend ubiquitous platforms like WhatsApp with trusted file formats to maximize infection rates. The use of MSI packages represents a significant trend, as defenders increasingly focus on blocking executable (.exe) files, prompting attackers to shift to other, less-monitored installer formats.
To defend against such threats, organizations and individuals must adopt a multi-layered security posture. Technical controls should include advanced email and web filtering to block malicious links, application allowlisting to prevent unauthorized scripts and installers from running, and endpoint detection and response (EDR) solutions to identify anomalous behaviors like VBScript launching MSI packages. On the human layer, continuous security awareness training is paramount. Users must be educated to scrutinize unexpected messages, even from seemingly known contacts, and to verify the legitimacy of requests through secondary channels before clicking links or downloading files. Vigilance and skepticism remain the first and most effective line of defense against socially engineered attacks.



