A recent campaign is targeting WhatsApp Web with new malware that is spreading via chat messages. Security experts have identified banking Trojans associated with the Astaroth malware, which propagate automatically, making them particularly challenging to halt once an assault starts.
This operation, dubbed Boto Cor-de-Rosa, illustrates the evolving tactics of cybercriminals as they exploit widely trusted tools. The current focus is on Windows users, leveraging WhatsApp Web as a means to deliver and further disseminate the malware.
Understanding the WhatsApp Web Attack
It all begins with what seems like an innocent message. A contact sends a ZIP file that appears harmless, with a name that does not arouse suspicion. Upon opening the ZIP, users inadvertently execute a Visual Basic script disguised as a standard document. This script covertly imports additional malware components, including the Astaroth banking Trojan, ultimately allowing for control over WhatsApp Web.
How the Malware Spreads
This threat is particularly alarming due to its propagation method. The Python module scans the victim’s WhatsApp contacts, sending out malicious ZIP files to every chat. Researchers at Acronis found that these messages can adapt based on the time of day, often using friendly and familiar tones. For example, they might read, “The following files are requested. If you have any questions, we’re always available.” Given the recognizable source, many individuals may not think twice before opening such messages.
Malware Capabilities
Once installed, this malware has the ability to read conversations and steal funds. The scripting is crafted to remain undetected, launching PowerShell commands to download further malware from compromised websites. One such domain linked to this operation has been identified.
The Vulnerability of WhatsApp Web
WhatsApp Web is widely accepted for its convenience, facilitating seamless communication by mirroring phone chats on computers. However, this convenience can mask security risks. By linking their phones with browser sessions through QR codes, users create a pathway where malware can operate unnoticed if it gains access to a logged-in session.
This situation makes WhatsApp Web a highly effective channel for malware distribution. Many users, unknowingly, leave sessions active on shared or public devices, offering cybercriminals an easy route without needing advanced tactics.
Protecting Against WhatsApp Web Malware
To defend against these attacks, adopting certain habits is crucial:
1) Be Cautious of Unsolicited Attachments
Given the informal nature of messaging apps, attackers often exploit this. Always verify the sender before opening any ZIP files, especially if they come unexpectedly or have unusual file names.
2) Secure WhatsApp Web Access
Regularly review and log out of any unfamiliar active WhatsApp Web sessions. Enabling two-factor authentication within WhatsApp settings can also enhance security.
3) Keep Your Windows PC Secure
Ensure you update your operating system and browser regularly, and utilize robust antivirus software that monitors potentially harmful activities.
4) Limit Personal Data Exposure
Reducing your digital footprint can lessen the risks associated with identity theft that often accompanies banking malware. Data deletion services can help remove your information from broker sites.
5) Consider Identity Theft Protection
Even with good security practices, monitoring your credit and personal data adds an extra layer of defense. Services can alert you to suspicious activity and help out if your data is compromised.
6) Trust Your Instincts
Many malware infections occur simply because individuals act impulsively. If something feels off about a message, take a moment to evaluate before proceeding.
Final Thoughts
This malware campaign serves as a reminder of the intricacies of modern cyberattacks. They can seamlessly infiltrate our daily communications, turning trusted conversations into vectors for banking malware. However, adopting proactive habits can significantly diminish the risk of falling victim to such threats.





