search

LEMON BLOG

WhatsApp Web is being hijacked to spread a banking trojan, automatically

WhatsApp Web is supposed to be the "quick and convenient" version of WhatsApp: scan a QR code, type on a full keyboard, drag-and-drop files, and keep chats flowing while you work. But that same convenience is exactly why cybercriminals love it.

Security researchers are tracking a malware campaign (often referred to as Boto Cor-de-Rosa) that turns WhatsApp Web into a self-spreading delivery system for a banking trojan associated with Astaroth. The worrying part is not just the malware itself. It's how the infection can jump from one person to many others without the attacker manually messaging every new victim.

If you've ever thought "It's fine, it came from someone I know," this is the kind of campaign designed to punish that assumption.

The big idea: weaponize trust, not the platform

Attackers don't need to "hack WhatsApp" to cause damage. They only need a Windows PC where WhatsApp Web is already logged in.

Once malware is running on that PC, it can behave like the user inside the browser session. That means it can open chats, read contact lists, and send attachments as if the real person is doing it. To everyone receiving those messages, it looks legitimate because it is coming from a real account.

That's the trick: the account is real, the session is trusted, the message is familiar, and the payload is malicious.

How the infection starts: a ZIP that looks boring on purpose

The entry point is usually simple and boring, because boring gets clicked.

A victim receives a WhatsApp message containing a ZIP attachment. The filename often looks random and harmless, which lowers suspicion. Inside the ZIP is typically a script file (commonly a Visual Basic script) disguised to resemble a normal document. If the user runs it, the script quietly kicks off the next stage.

From there, the script pulls down additional components, including:

The victim often won't see a big "you are infected" warning. The goal is to stay quiet and keep working in the background.

What makes it nasty: it spreads through your contacts by itself

Most malware relies on the attacker pushing out the next wave. This campaign doesn't have to.

Once the WhatsApp Web automation component is running, it can scan the victim's chats/contacts and begin sending the same malicious ZIP attachment out to active conversations. The message may include friendly, casual wording, sometimes even adjusted based on time of day to feel more natural, like a normal "morning" or "evening" greeting.

That's why it spreads quickly: recipients trust the sender, because the sender is literally someone they know.

This is the modern version of an email worm, except it's happening inside a messaging app people treat as informal and safe.

Behind the scenes: the attackers track "campaign performance" like marketers

One detail that shows how professional these operations have become is the built-in tracking.

The propagation tool reportedly keeps score as it spreads: how many messages were sent, how many failed, and how fast it's moving. Progress updates after a certain number of messages help attackers see if they're being blocked, rate-limited, or detected.

In other words, it's not just malware. It's malware with analytics.

After the click: what the malware does on an infected Windows PC

Once the initial script runs, it's often heavily obfuscated (scrambled) to dodge antivirus detection. Then it can use system tools like PowerShell to download more payloads from external infrastructure, including compromised websites used as staging points.

To stay hidden, the malware may install itself in folders that resemble legitimate software directories (for example, something that looks like a browser cache path). This makes it harder for a quick manual check to spot anything "obviously wrong."

With a banking trojan in place, typical goals include:

Even if the initial focus is banking, the broader impact can be bigger: once a system is compromised, it can be used for additional malware, account takeover, and lateral spread.

Why WhatsApp Web is such a good target

WhatsApp Web works by extending your phone's WhatsApp into a browser session. Once paired, that browser becomes a trusted endpoint with real access to chats and the ability to send messages using your identity.

That trust model is normally fine, because it assumes your PC is clean.

But if malware lands on your PC while WhatsApp Web is logged in, the attacker doesn't have to break encryption or bypass WhatsApp security. They can simply abuse the already-authenticated session and behave like you.

And many people leave WhatsApp Web logged in for weeks on work machines or shared PCs. That increases exposure dramatically.

How to protect yourself without getting paranoid 

You don't need to treat every message like a bomb. But you do need a few habits that shut down this type of spread.

The takeaway: messaging apps are now a frontline

This campaign is a reminder that cyberattacks are increasingly designed to look normal. They hide inside everyday habits: casual chats, familiar names, routine attachments, and trusted browser sessions.

The uncomfortable truth is that a single infected PC can turn one person into an unintentional distributor of malware across dozens of contacts. The good news is that you can block most of it with simple habits: verify unexpected attachments, lock down WhatsApp Web sessions, keep your system updated, and slow down before clicking.

Convenience is great. Just don't let it become autopilot.

ShopeePay Raises Its E-Wallet Limit to RM30,000 fo...
A Quiet Windows SMB Client Flaw That Can Snowball ...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Monday, 27 April 2026

Captcha Image

LEMON VIDEO CHANNELS

Step into a world where web design & development, gaming & retro gaming, and guitar covers & shredding collide! Whether you're looking for expert web development insights, nostalgic arcade action, or electrifying guitar solos, this is the place for you. Now also featuring content on TikTok, we’re bringing creativity, music, and tech straight to your screen. Subscribe and join the ride—because the future is bold, fun, and full of possibilities!

My TikTok Video Collection