Security

WhatsApp Malware Campaign Uses VBS and MSI Backdoors

3 min read

Summary

Microsoft Defender Experts uncovered a late-February 2026 campaign that uses WhatsApp messages to deliver malicious VBS files, then installs unsigned MSI packages for persistence and remote access. The attack blends social engineering, renamed Windows utilities, and trusted cloud services to evade detection, making endpoint controls and user awareness critical.

Audio Summary

0:00--:--
Need help with Security?Talk to an Expert

Introduction

Microsoft has published details on a sophisticated malware campaign that starts with WhatsApp-delivered VBS files and ends with persistent remote access through malicious MSI installers. For IT and security teams, this matters because the attackers abuse legitimate Windows tools and trusted cloud platforms, making the activity harder to distinguish from normal enterprise traffic.

What’s new in this campaign

Microsoft Defender Experts observed the campaign beginning in late February 2026. The attack chain includes multiple stages designed to evade detection and maintain long-term access:

  • Initial access through WhatsApp: Attackers send malicious .vbs files via WhatsApp messages, relying on user trust in familiar communication apps.
  • Use of renamed Windows tools: The scripts copy legitimate utilities such as curl.exe and bitsadmin.exe, then rename them to misleading filenames like netapi.dll and sc.exe.
  • Payload delivery from trusted cloud services: Secondary payloads are downloaded from services including AWS S3, Tencent Cloud, and Backblaze B2.
  • Privilege escalation and persistence: The malware tampers with UAC-related registry settings and repeatedly attempts elevated command execution.
  • Final-stage MSI backdoors: Unsigned MSI files such as Setup.msi, WinRAR.msi, LinkPoint.msi, and AnyDesk.msi are used to establish remote access.

Why this is significant

This campaign combines several trends defenders are seeing more often:

  • Living-off-the-land techniques using native Windows binaries
  • Cloud-hosted malware delivery that blends into legitimate traffic
  • Social engineering through consumer messaging platforms
  • Persistence through MSI installers that may appear routine in managed environments

A notable detection opportunity is the mismatch between a file’s actual name and its embedded OriginalFileName PE metadata. Security tools that inspect this metadata may be able to flag renamed binaries more effectively.

Impact on IT administrators

Security and endpoint teams should assume that blocking by file type alone is not enough. The campaign can bypass casual inspection by using hidden folders, trusted download sources, and legitimate administrative tooling.

Organizations using Microsoft Defender should pay particular attention to:

  • Script host activity from untrusted paths (wscript, cscript, mshta)
  • Registry changes tied to UAC behavior
  • Unsigned MSI execution
  • Network connections to cloud object storage used for payload staging
  • Endpoint detections tied to renamed binaries and suspicious command-line flags
  • Restrict script execution in untrusted locations where possible.
  • Enable cloud-delivered protection in Microsoft Defender Antivirus.
  • Run Defender for Endpoint EDR in block mode to stop artifacts missed by other controls.
  • Monitor cloud traffic for suspicious downloads from AWS, Tencent Cloud, and Backblaze B2.
  • Train users to avoid opening unexpected WhatsApp attachments, even from seemingly trusted contacts.

This campaign is a reminder that trusted apps, legitimate tools, and common cloud services can all be weaponized. Defenders should combine endpoint telemetry, cloud traffic inspection, and user awareness to reduce exposure.

Need help with Security?

Our experts can help you implement and optimize your Microsoft solutions.

Talk to an Expert

Stay updated on Microsoft technologies

WhatsApp malwareVBSMSI backdoorMicrosoft Defenderthreat detection

Related Posts

Security

Autonomous AI Agents: Microsoft Defense-in-Depth

Microsoft outlines a defense-in-depth approach for securing autonomous AI agents as they move from assisting users to taking actions across systems. The guidance emphasizes that the application layer—not just the model—is the most important control point for limiting permissions, enforcing human review, and reducing blast radius in production.

Security

AI App Misconfigurations Expose Cloud Workloads

Microsoft warns that insecure AI app deployments are creating exploitable misconfigurations, especially on Kubernetes, where public exposure and weak authentication can lead to remote code execution, credential theft, and data exposure. The research highlights risks in MCP servers, Mage AI, kagent, and AutoGen Studio, and reinforces the need for hardening and continuous posture monitoring with tools like Defender for Cloud.

Security

Kazuar Botnet Analysis: Secret Blizzard’s New Tactics

Microsoft Threat Intelligence detailed how Kazuar has evolved from a traditional backdoor into a modular peer-to-peer botnet used by the Russian state actor Secret Blizzard. The report matters for defenders because the malware’s Kernel, Bridge, and Worker architecture is designed to reduce visibility, improve resilience, and support long-term espionage operations.

Security

Microsoft MDASH Security System Finds 16 Windows Flaws

Microsoft unveiled MDASH, a new multi-model agentic security system that helped identify 16 previously unknown vulnerabilities in the Windows networking and authentication stack, including four critical remote code execution flaws. The announcement matters for security teams because it shows AI-driven vulnerability discovery is moving from research into production-scale defensive operations, with strong benchmark results and a limited private preview now underway.

Security

Microsoft Defender AI Synthetic Logs for Detection Engineering

Microsoft Defender Security Research detailed a new AI-assisted approach for generating high-fidelity synthetic attack logs from attacker TTPs and actions. The research could help security teams speed up detection engineering, test more attack scenarios, and reduce reliance on costly lab simulations while protecting sensitive data.

Security

Modern DDoS Attacks: Microsoft’s Defense Guidance

Microsoft says DDoS attacks against consumer web properties are becoming more frequent, stealthier, and increasingly focused on application-layer abuse rather than simple bandwidth floods. The company recommends a defense-in-depth approach using resilient application design, edge protections, telemetry, and Azure services such as DDoS Protection and Web Application Firewall to keep services available under attack.