WhatsApp on Windows users targeted in new campaign, warns Microsoft
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是微软的研究人员发现了一个针对WhatsApp桌面版用户的攻击活动。攻击者通过发送看似无害的附件,实际上是VBS脚本文件,诱导用户运行。一旦运行,脚本会复制系统工具,下载恶意软件,并最终安装远程控制软件,让攻击者获得远程访问权限。 接下来是防护建议:不要打开未经验证的附件、启用文件扩展名显示、使用防恶意软件工具、从官方渠道下载软件、注意异常提示、保持系统和应用更新。 现在我要把这些信息浓缩到100字以内。重点包括攻击方式、利用的漏洞、恶意行为以及防护措施。 可能的结构:微软发现攻击者利用WhatsApp附件中的VBS脚本感染Windows用户,通过社会工程学手段诱导执行恶意代码,最终实现远程控制。建议用户提高警惕,采取防护措施。 检查字数是否在限制内,并确保信息准确全面。 </think> 微软发现攻击者利用WhatsApp附件中的VBS脚本感染Windows用户。这些脚本通过社会工程学诱导执行,下载恶意软件并安装远程控制工具。建议用户谨慎打开附件、启用文件扩展名显示、使用防恶意软件工具,并保持系统更新以防范此类攻击。 2026-4-1 14:27:39 Author: securityboulevard.com(查看原文) 阅读量:2 收藏

Microsoft researchers found a campaign that abuses WhatsApp attachments to sneak a script onto Windows machines which will lead to the attacker gaining remote control.

WhatsApp offers a desktop application for Windows and macOS, which users can synchronize with their mobile devices. Desktop versions of WhatsApp are generally used as extensions of mobile apps rather than primary platforms. So, while wide usage of these apps exists, their adoption rate is likely significantly lower when compared to mobile platforms.

Last year, we wrote about Meta closing a vulnerability that allowed an attacker to run arbitrary code on a Windows system which existed in all WhatsApp versions before 2.2450.6.

The attacks found by Microsoft however are based solely on social engineering. The target receives a WhatsApp attachment that looks harmless enough, but it is actually a .vbs (Visual Basic Script) file that Windows can execute.

If the attacker manages to convince the victim to run the file on Windows, the script copies built‑in Windows tools into a hidden folder and gives them misleading names so they look harmless at first glance.

And the tools themselves are legitimate ones, but they’re abused to download malware. A classic living off the land (LOTL) technique which uses what’s already on the system instead of introducing malware binaries that would get picked up in a scan.

The next scripts are pulled from popular cloud providers, so network traffic looks like normal access to AWS, Tencent Cloud, or Backblaze instead of some shady server that would raise red flags.

To turn off other possible alarms, the malware keeps trying to elevate itself to administrator, then tweaks UAC (User Account Control) prompts and registry settings so it can silently make system‑level changes and persist across reboots.

At the end of the infection chain, an unsigned MSI (Microsoft Installer) sets up remote‑access software and other payloads, giving the attacker ongoing, hands‑on access to the machine and data.

How to stay safe

For home users and small businesses, there are some practical steps to stay safe:

  • Do not open unsolicited attachments until you have verified with a trusted source that they are safe.
  • Turn on View File name extensions in Explorer so that a file claiming to be picture but ending in .vbs or .msi can be identified as such.
  • Use an up-to-date real-time anti-malware solution to stop unwanted connections and identify malicious files.
  • Download software only from the vendor’s official site and check that installers are signed.
  • Don’t ignore warning signs. Unexpected UAC prompts, new software suddenly appearing, or your machine becoming sluggish after opening a WhatsApp attachment are all reasons for an anti-malware scan and, if needed, be prepared to restore from a clean backup.
  • Keep Windows and all other applications current to prevent from exploiting known vulnerabilities.

We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

*** This is a Security Bloggers Network syndicated blog from Malwarebytes authored by Malwarebytes. Read the original post at: https://www.malwarebytes.com/blog/news/2026/04/whatsapp-on-windows-users-targeted-in-new-campaign-warns-microsoft


文章来源: https://securityboulevard.com/2026/04/whatsapp-on-windows-users-targeted-in-new-campaign-warns-microsoft/
如有侵权请联系:admin#unsafe.sh