xiand.ai
Cybersecurity

Microsoft Warns Users Against Malicious WhatsApp Messages Delivering MSI Packages

Microsoft researchers identified a sophisticated campaign exploiting WhatsApp to deliver malicious installers. The attack uses renamed system utilities to bypass detection and gain remote access to compromised devices. Organizations must prioritize user training to mitigate the risk of social engineering attacks.

La Era

3 min read

Microsoft Warns Users Against Malicious WhatsApp Messages Delivering MSI Packages
Microsoft Warns Users Against Malicious WhatsApp Messages Delivering MSI Packages

Microsoft issued a formal warning regarding a sophisticated cyber campaign exploiting WhatsApp to distribute malicious software to enterprise users. Researchers discovered a multi-stage attack chain originating in late February that targets Windows device users globally across various industries. The threat involves social engineering tactics designed to trick recipients into executing dangerous files directly from their trusted messaging applications. This warning comes as cybercriminals increasingly leverage communication platforms to bypass traditional email security gateways.

The attack begins when a user receives a WhatsApp message containing a malicious Visual Basic Script file disguised as a standard document or update notification. Attackers reportedly compromise existing contact sessions or use urgency lures to persuade victims to download the attachment without careful scrutiny. Once executed, the script creates hidden folders within the C:\ProgramData directory on the host machine to store its components.

Key Technical Details of the Attack

Cybercriminals utilize a technique known as living off the land by renaming legitimate Windows utilities to bypass standard security heuristics. Specific binaries like curl.exe and bitsadmin.exe appear as renamed files such as netapi.dll and sc.exe within the compromised system directory. This approach allows the malware to blend in with normal network activity and evade initial detection by basic monitoring tools. The attackers rely on the assumption that security teams will not flag legitimate system tools modified for malicious use.

Despite the renaming tactic, the binaries retain their original Portable Executable metadata within the file structure itself. Microsoft researchers noted that the OriginalFileName field still identifies the files as their genuine names despite the visible name change. This discrepancy provides a clear signal for security solutions like Microsoft Defender to flag the suspicious activity before damage occurs. Advanced detection systems can now leverage this metadata mismatch to identify the threat early in the infection chain.

"Notably, these renamed binaries retain their original PE metadata," Microsoft's researchers wrote in a Tuesday blog post. "This means Microsoft Defender and other security solutions can leverage this metadata discrepancy as a detection signal." The quote highlights the importance of deep file inspection rather than relying solely on visible file names or hashes.

Security Implications and Mitigation

The malware proceeds to download secondary payloads from trusted cloud services including AWS and Backblaze B2 to avoid blocking. These secondary scripts attempt to alter User Account Control settings to launch cmd.exe with elevated privileges on the victim machine. The goal is to ensure the malware survives system reboots and maintains persistent access to the compromised system. Using trusted cloud infrastructure makes it difficult to distinguish between normal enterprise activity and malicious downloads.

Attackers finally deploy malicious Microsoft Installer packages, including setups mimicking popular tools like AnyDesk and WinRAR to maintain credibility. These final installers are unsigned, which serves as another indicator that the software is not legitimate enterprise software. They provide remote access capabilities, allowing criminals to steal data or deploy ransomware on vulnerable devices. The unsigned nature of these installers provides a secondary verification point for security operations teams.

Microsoft advises organizations to train employees on recognizing suspicious attachments from messaging platforms like WhatsApp or Signal. Reinforcing user awareness remains a critical defense against social engineering campaigns targeting common applications used daily. Security vendors recommend using their products to identify and block these specific file types and behaviors immediately. Training programs should focus on verifying the source of any unexpected file transfers regardless of the perceived trust level.

This campaign highlights the evolving risks associated with trusted communication channels in enterprise environments and personal devices. As attackers refine their methods, organizations must balance convenience with robust verification protocols for incoming files and attachments. Future updates to Windows security features may address these specific metadata anomalies more aggressively to protect users. The shift toward messaging-based attacks requires security strategies that account for social engineering risks beyond traditional email vectors.

Comments

Comments are stored locally in your browser.