WhatsApp on Windows users targeted in new campaign, warns Microsoft
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。直接写描述就行。首先,我得通读整篇文章,抓住主要信息。 文章讲的是微软的研究人员发现了一个滥用WhatsApp附件的攻击活动。攻击者通过发送看似无害的附件,实际上是VBS脚本文件,一旦用户在Windows上运行,就会导致恶意软件的下载和安装。这种攻击主要依赖于社会工程学,利用了用户对WhatsApp的信任。 接下来,攻击过程包括复制Windows工具到隐藏文件夹,并修改系统设置以提升权限和保持持久性。最终,安装远程控制软件,让攻击者获得对机器的控制权。文章还给出了防范建议,比如不随意打开附件、启用文件扩展名显示、使用杀毒软件等。 所以,在总结时需要涵盖攻击方式、技术手段以及防范措施。要简洁明了,在100字以内表达清楚。 可能的结构是:微软发现WhatsApp附件被滥用,VBS脚本导致恶意软件安装,社会工程学攻击,防范建议包括验证附件来源、启用文件扩展名等。 检查一下字数是否符合要求。确保没有遗漏关键点,并且语言流畅自然。 </think> 微软研究人员发现了一种利用WhatsApp附件传播恶意软件的攻击活动。攻击者通过伪装成无害文件的.VBS脚本,在Windows设备上执行恶意代码,最终实现远程控制。此类攻击依赖于社会工程学手段,受害者需手动运行脚本才能触发感染链。为防范此类威胁,用户应避免打开未经验证的附件,并启用文件扩展名显示功能以识别潜在威胁。 2026-4-1 14:27:39 Author: www.malwarebytes.com(查看原文) 阅读量:5 收藏

Microsoft researchers found a campaign that abuses WhatsApp attachments to sneak a script onto Windows machines which will lead to the attacker gaining remote control.

WhatsApp offers a desktop application for Windows and macOS, which users can synchronize with their mobile devices. Desktop versions of WhatsApp are generally used as extensions of mobile apps rather than primary platforms. So, while wide usage of these apps exists, their adoption rate is likely significantly lower when compared to mobile platforms.

Last year, we wrote about Meta closing a vulnerability that allowed an attacker to run arbitrary code on a Windows system which existed in all WhatsApp versions before 2.2450.6.

The attacks found by Microsoft however are based solely on social engineering. The target receives a WhatsApp attachment that looks harmless enough, but it is actually a .vbs (Visual Basic Script) file that Windows can execute.

If the attacker manages to convince the victim to run the file on Windows, the script copies built‑in Windows tools into a hidden folder and gives them misleading names so they look harmless at first glance.

And the tools themselves are legitimate ones, but they’re abused to download malware. A classic living off the land (LOTL) technique which uses what’s already on the system instead of introducing malware binaries that would get picked up in a scan.

The next scripts are pulled from popular cloud providers, so network traffic looks like normal access to AWS, Tencent Cloud, or Backblaze instead of some shady server that would raise red flags.

To turn off other possible alarms, the malware keeps trying to elevate itself to administrator, then tweaks UAC (User Account Control) prompts and registry settings so it can silently make system‑level changes and persist across reboots.

At the end of the infection chain, an unsigned MSI (Microsoft Installer) sets up remote‑access software and other payloads, giving the attacker ongoing, hands‑on access to the machine and data.

How to stay safe

For home users and small businesses, there are some practical steps to stay safe:

  • Do not open unsolicited attachments until you have verified with a trusted source that they are safe.
  • Turn on View File name extensions in Explorer so that a file claiming to be picture but ending in .vbs or .msi can be identified as such.
  • Use an up-to-date real-time anti-malware solution to stop unwanted connections and identify malicious files.
  • Download software only from the vendor’s official site and check that installers are signed.
  • Don’t ignore warning signs. Unexpected UAC prompts, new software suddenly appearing, or your machine becoming sluggish after opening a WhatsApp attachment are all reasons for an anti-malware scan and, if needed, be prepared to restore from a clean backup.
  • Keep Windows and all other applications current to prevent from exploiting known vulnerabilities.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/04/whatsapp-on-windows-users-targeted-in-new-campaign-warns-microsoft
如有侵权请联系:admin#unsafe.sh