Security

WhatsApp Malware Campaign Uses VBS and MSI Backdoors

3 min read

Summary

Microsoft Defender Experts uncovered a late-February 2026 campaign that uses WhatsApp messages to deliver malicious VBS files, then installs unsigned MSI packages for persistence and remote access. The attack blends social engineering, renamed Windows utilities, and trusted cloud services to evade detection, making endpoint controls and user awareness critical.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has published details on a sophisticated malware campaign that starts with WhatsApp-delivered VBS files and ends with persistent remote access through malicious MSI installers. For IT and security teams, this matters because the attackers abuse legitimate Windows tools and trusted cloud platforms, making the activity harder to distinguish from normal enterprise traffic.

What’s new in this campaign

Microsoft Defender Experts observed the campaign beginning in late February 2026. The attack chain includes multiple stages designed to evade detection and maintain long-term access:

  • Initial access through WhatsApp: Attackers send malicious .vbs files via WhatsApp messages, relying on user trust in familiar communication apps.
  • Use of renamed Windows tools: The scripts copy legitimate utilities such as curl.exe and bitsadmin.exe, then rename them to misleading filenames like netapi.dll and sc.exe.
  • Payload delivery from trusted cloud services: Secondary payloads are downloaded from services including AWS S3, Tencent Cloud, and Backblaze B2.
  • Privilege escalation and persistence: The malware tampers with UAC-related registry settings and repeatedly attempts elevated command execution.
  • Final-stage MSI backdoors: Unsigned MSI files such as Setup.msi, WinRAR.msi, LinkPoint.msi, and AnyDesk.msi are used to establish remote access.

Why this is significant

This campaign combines several trends defenders are seeing more often:

  • Living-off-the-land techniques using native Windows binaries
  • Cloud-hosted malware delivery that blends into legitimate traffic
  • Social engineering through consumer messaging platforms
  • Persistence through MSI installers that may appear routine in managed environments

A notable detection opportunity is the mismatch between a file’s actual name and its embedded OriginalFileName PE metadata. Security tools that inspect this metadata may be able to flag renamed binaries more effectively.

Impact on IT administrators

Security and endpoint teams should assume that blocking by file type alone is not enough. The campaign can bypass casual inspection by using hidden folders, trusted download sources, and legitimate administrative tooling.

Organizations using Microsoft Defender should pay particular attention to:

  • Script host activity from untrusted paths (wscript, cscript, mshta)
  • Registry changes tied to UAC behavior
  • Unsigned MSI execution
  • Network connections to cloud object storage used for payload staging
  • Endpoint detections tied to renamed binaries and suspicious command-line flags
  • Restrict script execution in untrusted locations where possible.
  • Enable cloud-delivered protection in Microsoft Defender Antivirus.
  • Run Defender for Endpoint EDR in block mode to stop artifacts missed by other controls.
  • Monitor cloud traffic for suspicious downloads from AWS, Tencent Cloud, and Backblaze B2.
  • Train users to avoid opening unexpected WhatsApp attachments, even from seemingly trusted contacts.

This campaign is a reminder that trusted apps, legitimate tools, and common cloud services can all be weaponized. Defenders should combine endpoint telemetry, cloud traffic inspection, and user awareness to reduce exposure.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

WhatsApp malwareVBSMSI backdoorMicrosoft Defenderthreat detection

Related Posts

Security

Microsoft Copilot Studio Tackles OWASP Agentic AI Risks

Microsoft outlines how Copilot Studio and the upcoming general availability of Agent 365 can help organizations address the OWASP Top 10 for Agentic Applications. The guidance matters because agentic AI systems can use real identities, data, and tools, creating security risks that go far beyond inaccurate outputs.

Security

Microsoft Defender HVA Protection Blocks Critical Attacks

Microsoft detailed how Microsoft Defender uses high-value asset awareness to detect and stop attacks targeting domain controllers, web servers, and identity infrastructure. By combining Security Exposure Management context with differentiated detections and automated disruption, Defender can raise protection levels on Tier-0 assets and reduce the blast radius of sophisticated intrusions.

Security

Identity Security in Microsoft Entra: RSAC 2026 Updates

Microsoft is positioning identity security as a unified control plane that combines identity infrastructure, access decisions, and threat protection in real time. At RSAC 2026, the company announced new Microsoft Entra and Defender capabilities, including an identity security dashboard, unified identity risk scoring, and adaptive risk remediation to help organizations reduce fragmentation and respond faster to identity-based attacks.

Security

Trivy Supply Chain Compromise: Defender Guidance

Microsoft has published detection, investigation, and mitigation guidance for the March 2026 Trivy supply chain compromise that affected the Trivy binary and related GitHub Actions. The incident matters because it weaponized trusted CI/CD security tooling to steal credentials from build pipelines, cloud environments, and developer systems while appearing to run normally.

Security

AI Agent Governance: Aligning Intent for Security

Microsoft outlines a governance model for AI agents that aligns user, developer, role-based, and organizational intent. The framework helps enterprises keep agents useful, secure, and compliant by defining behavioral boundaries and a clear order of precedence when conflicts arise.

Security

Microsoft Defender Predictive Shielding Stops GPO Ransomware

Microsoft detailed a real-world ransomware case in which Defender’s predictive shielding detected malicious Group Policy Object abuse before encryption began. By hardening GPO propagation and disrupting compromised accounts, Defender blocked about 97% of attempted encryption activity and prevented any devices from being encrypted through the GPO delivery path.