The post Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web appeared on BitcoinEthereumNews.com. Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts. CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip.  They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload. Maverick malware loader hidden through classic obfuscation According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick. Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code.  Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials. Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users. How Maverick hijacks WhatsApp web CyberProof’s research… The post Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web appeared on BitcoinEthereumNews.com. Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts. CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip.  They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload. Maverick malware loader hidden through classic obfuscation According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick. Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code.  Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials. Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users. How Maverick hijacks WhatsApp web CyberProof’s research…

Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web

2025/11/12 23:23

Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts.

CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip. 

They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload.

Maverick malware loader hidden through classic obfuscation

According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick.

Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code. 

Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials.

Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users.

How Maverick hijacks WhatsApp web

CyberProof’s research stated that the campaign avoids .NET binaries in favor of VBScript and PowerShell. The ZIP archive contains an obfuscated VBScript downloader named Orcamento.vbs, which researchers tie to SORVEPOTEL. 

The VBScript executes a PowerShell command that runs tadeu.ps1 directly in memory, while PowerShell payload automates Chrome via ChromeDriver and Selenium. It takes over the victim’s WhatsApp Web session and distributes the malicious ZIP to all contacts.

The malware terminates any running Chrome processes and copies the legitimate Chrome profile to a temporary workspace before sending any messages. 

“This data includes cookies, authentication tokens, and the saved browser session, and allows the malware to bypass WhatsApp Web’s authentication to give a hacker immediate access to the victim’s WhatsApp account without any security alerts or QR code scanning,” American-Japanese cyber security software company Trend Micro surmised.

The script, after taking control of the Web app, displays a deceptive banner labeled “WhatsApp Automation v6.0” to hide its ongoing operations activity. The PowerShell code retrieves message templates from a command‑and‑control (C2) server and exfiltrates the victim’s contact list. 

The propagation loop iterates through every harvested contact before sending each message and after checking if the C2 has issued a pause command. Messages are personalized by substituting variables with time‑based greetings and contact names.

Trend Micro notes the campaign uses a sophisticated remote C2 that supports real‑time management. Operators can pause, resume and monitor propagation to run coordinated operations in infected hosts. 

Maverick Malware only deploys after confirming client is in Brazil 

Cyberproof and Trend Micro confirmed that Maverick installs only after confirming the host is in Brazil through checking the time zone, language, system region, and date and time format. The latter company also found that the chain restricts execution to Portuguese‑language systems. 

The C2 infrastructure includes email‑based channels, according to Trend Micro’s report, adding to its redundancy while making it hard to detect. CyberProof also found evidence the malware singled out hotels in Brazil. The security firms feared the actor may broaden its objectives to the hospitality industry, well frequented by targets of high value.

VirusTotal searches helped the team collect related samples and tie their findings to public research from Kaspersky, Sophos and Trend Micro. Yet, security firm CyberProof’s incident analysis revealed that the full infection chain could not be observed because files from the C2 failed to deliver during its investigation.

Join a premium crypto trading community free for 30 days – normally $100/mo.

Source: https://www.cryptopolitan.com/maverick-malware-takes-over-whatsapp-web/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BitMine koopt $44 miljoen aan ETH

BitMine koopt $44 miljoen aan ETH

De grootste Ethereum (ETH) treasury ter wereld, BitMine Immersion Technologies, heeft weer toegeslagen op de crypto markt. Uit on-chain data blijkt dat BitMine, ook bekend onder het ticker symbool BMNR, voor $44 miljoen aan ETH munten heeft gekocht. Wat betekent dit voor de grootste altcoin? Check onze Discord Connect met "like-minded" crypto enthousiastelingen Leer gratis de basis van Bitcoin & trading - stap voor stap, zonder voorkennis. Krijg duidelijke uitleg & charts van ervaren analisten. Sluit je aan bij een community die samen groeit. Nu naar Discord BitMine verdubbelt inzet op Ethereum Om precies te zijn koopt BitMine 14.618 ETH munten erbij, goed voor dus $44 miljoen. Zo blijkt uit on-chain gegevens gedeeld door Lookonchain op X. Daarmee tilt de grote Ethereum treasury zijn voorraad naar maar liefst 3,63 miljoen ETH ter waarde van ruim $11 miljard, aldus data van StrategicETHReserve. Daarmee controleert het bedrijf nu 3% van alle Ethereum in omloop. Tom Lee(@fundstrat)’s #Bitmine just bought another 14,618 $ETH($44.34M) 4 hours ago.https://t.co/P684j5Yil8 pic.twitter.com/LHOpDto1R5 — Lookonchain (@lookonchain) November 28, 2025 De ambities liggen desondanks een stuk hoger: BitMine wil uiteindelijk 5% van de volledige ETH voorraad bezitten. Oftewel, we kunnen nog flink wat Ethereum aankopen verwachten van het bedrijf in de komende maanden. Door de aggresssieve ETH strategie van het bedrijf zijn ze bij uitstek de grootste Ethereum reserve. De nummer twee, SharpLink Gaming, bezit ongeveer 859.400 ETH munten ter waarde van zo’n $2,62 miljard. Deze agressieve uitbreiding volgt een duidelijke strategie. BitMine verwacht dat Ethereum een grotere rol in de tokenisatie. Bedrijven bezitten samen al bijna 5,01% van alle ETH, een signaal dat corporates zich voorbereiden op een toekomst waarin Ethereum een basislaag wordt voor financiële infrastructuur. Waarom BitMine zijn treasury blijft uitbreiden BitMine bouwt zijn treasury verder uit omdat het een dominante positie in het Ethereum netwerk wil innemen. Meer ETH geeft BitMine straks hogere staking-opbrengsten en meer invloed op de liquiditeit binnen het netwerk. Ook gelooft BMNR sterk in de rol van Ethereum in de toekomst van financiële infrastructuur. Bestuurslid Tom Lee verwacht dat ETH een dominante speler zal zijn in de stablecoin en tokenisatie markt. Beide sectoren zijn hard aan het groeien, mede dankzij duidelijke wet- en regelgeving onder de Trump administratie zoals de GENIUS Act. Daarnaast gelooft Tom Lee in een zogeheten supercycle voor ETH. Volgens de bekende top analist kan de grootste altcoin zelfs Bitcoin (BTC) voorbijstreven, allemaal dankzij grootschalige adoptie door tokenisatie. Als Ethereum de huidige marketcap van BTC wil evenaren dan zou de ETH koers al op ruim $15.000 komen. ETH en BMNR krabbelen langzaam op uit diepe dip De ethereum prijs reageerde vandaag beperkt op het nieuws. De altcoin steeg over de afgelopen 24 uur met 0,8% tot een huidige koers van $3.050. Daarmee zet de munt samen met de rest van de crypto markt een stijgende trend voort. Na een heftige crash in de afgelopen weken zakte de ETH koers vorige week vrijdag tot onder de $2.700. Ook het BMNR aandeel is langzaam aan het terugkrabbelen. Het ETH treasury bedrijf zakte vorige week tot $26. Een flinke crash ten opzichte van de all time high van $135 dat het bedrijf in juli van dit jaar nog wist te realiseren. De sterke daling van het BMNR aandeel valt samen met een algehele neerwaartse trend onder crypto treasury bedrijven. Ook Strategy, de grootste publieke Bitcoin houder, is ook flink lager aan het handelen vanaf zijn all time. Zo staat het MSTR aandeel momenteel op $175 tegenover een prijs record van $457 in juli. Ethereum (ETH) kopen op Bitvavo Bitvavo - grootste crypto exchange in Nederland Meer dan 340 beschikbare cryptocurrencies Lage transactiekosten Gemakkelijk via iDeal geld storten Professionele traders dashboard Bitvavo review Koop ETH op Bitvavo Let op: cryptocurrency is een zeer volatiele en ongereguleerde investering. Doe je eigen onderzoek. Het bericht BitMine koopt $44 miljoen aan ETH is geschreven door Thomas van Welsenes en verscheen als eerst op Bitcoinmagazine.nl.
Share
Coinstats2025/11/28 20:31
Upbit hack sparks altcoin season in Korea? Thailand targets WLD

Upbit hack sparks altcoin season in Korea? Thailand targets WLD

The post Upbit hack sparks altcoin season in Korea? Thailand targets WLD appeared on BitcoinEthereumNews.com. Korean crypto bros are pumping altcoins after Upbit’s $36M exploit Korean crypto traders are having an outsize effect on local altcoin prices following a major hack at South Korean exchange Upbit, according to CryptoQuant CEO Ki Young Ju. (Ki Young Ju) “Upbit got hacked and paused withdrawals, but Koreans are pumping alts since arbitrage bots are no longer running,” Ju said in an X post on Thursday, shortly after the exchange halted transaction activity after detecting an “abnormal transaction” with a value of around $36 million. With arbitrage activity suspended, local buy orders are having more significant pressure on prices, allowing Korean-listed altcoins to surge, as the selling pressure that typically puts a ceiling on price increases has disappeared. Crypto trader R2D2 said, “Unbelievable scenes here.” Crypto analyst A79 said, “Hack happens, and Koreans just flip it into a rally.” Upbit announced on Thursday that it had suspended deposits and withdrawals after identifying an unauthorized transaction worth approximately 54 billion won ($36 million), involving mainly Solana-based assets that were transferred to an unidentified wallet address. Assets reportedly affected by the hack include BONK (BONK), Official Trump (TRUMP), MOODENG (MOODENG), and Render (RENDER). Upbit to cover loss to prevent “any damage” to user assets The exchange clarified that while the hot wallet was impacted, its cold wallets — where the majority of user funds are stored — were not compromised. Dunamu CEO Oh Kyung-seok said: “We immediately identified the extent of the digital asset outflow caused by the abnormal withdrawals and will cover the entire amount with Upbit assets to prevent any damage to our members’ assets.” Some industry participants were confused by the fact that all the red numbers Ju shared were positive. StarkWare ecosystem lead Brother Odin was quick to ask the obvious question, before Ju explained that red…
Share
BitcoinEthereumNews2025/11/28 21:20