WhatsApp Malware Targets Windows 11 PCs via VBS Scripts

by Priyanka Patel

Cybercriminals are increasingly leveraging the trust users place in familiar messaging apps to breach secure environments. In a recent alert, the Microsoft Defender Security Team warned of a sophisticated campaign where hackers use WhatsApp to deliver malware directly to Windows PCs, specifically targeting users of the WhatsApp desktop application on Windows 11.

The attack exploits a critical behavioral gap: the ability for files to be executed directly from the desktop version of the messenger. By blending social engineering with a multi-stage infection process, attackers are bypassing traditional security perceptions, turning a convenient communication tool into a gateway for full system compromise.

For those of us who spent years in software engineering before moving into reporting, this is a classic example of “living off the land.” The attackers aren’t just using a single virus; they are using legitimate system tools and trusted cloud infrastructure to hide their tracks, making the intrusion look like routine background noise to the average user.

How the WhatsApp Infection Chain Works

The breach does not happen through a technical flaw in WhatsApp itself, but rather through the manipulation of the user. The process begins when a victim receives a message from an unknown sender containing a seemingly harmless attachment. These attachments are actually malicious Visual Basic (VBS) scripts.

How the WhatsApp Infection Chain Works

Once a user opens the attachment, the infection unfolds in a calculated sequence designed to evade detection:

  • Initial Foothold: The VBS script creates hidden directories within the C:ProgramData folder. To avoid raising red flags, the malware drops modified versions of legitimate Windows programs, using deceptive names such as netapi.dll or sc.exe.
  • Cloud-Based Payload Delivery: The malware then reaches out to reputable cloud services, including Amazon Web Services (AWS) and Tencent Cloud, to download additional components. Because the traffic is directed toward known cloud providers, it often appears as normal network activity to basic security monitors.
  • Privilege Escalation: After the secondary components are installed, the malware targets the Windows User Account Control (UAC). By disabling these prompts, the attackers can gain administrator rights via cmd.exe without the user ever seeing a warning pop-up.
  • Persistence: The software creates specific Registry entries, ensuring that the malware remains active and automatically restarts even after the computer is rebooted.

The Final Payload: Remote Access Trojans

The endgame of this campaign is the installation of unsigned installation files (MSI files). These files often masquerade as well-known software to further deceive the user, using names like WinRAR.msi, AnyDesk.msi, LinkPoint.msi, or a generic Setup.msi.

These files contain remote administration tools (RATs) or backdoors. Once these are active, the attackers have a permanent “backdoor” into the PC. This allows them to exfiltrate sensitive personal data, monitor user activity in real-time, or use the compromised machine as a jumping-off point to attack other devices on the same local network.

Who is at Risk and Why It Matters

Whereas the campaign specifically targets Windows 11 users of the WhatsApp desktop app, the underlying risk is a broader trend in cybersecurity. The shift toward “cross-platform” productivity means that the security boundary between a mobile device (where WhatsApp is typically seen as a safe, encrypted bubble) and a workstation (where professional data is stored) has blurred.

This attack is particularly dangerous for corporate employees who use WhatsApp for quick coordination. If a staff member opens a malicious file on a company-connected PC, the attacker doesn’t just get a personal laptop—they potentially gain access to the corporate intranet and internal databases.

Summary of the WhatsApp-to-Windows Attack Vector
Stage Method Objective
Delivery WhatsApp Desktop Message User Interaction (Social Engineering)
Execution Visual Basic (VBS) Scripts Establish hidden folders in ProgramData
Expansion AWS/Tencent Cloud Downloads Bypass network filters via trusted IPs
Control UAC Disabling & MSI Install Full Administrator access & Remote Control

Practical Steps for Protection

Because this attack relies heavily on social engineering, technical patches alone are not enough. The most effective defense is a combination of system hardening and user vigilance.

Microsoft recommends that organizations and individual users block scripting hosts to prevent VBS scripts from executing. Monitoring network traffic for unusual connections to cloud storage services—especially when those connections are initiated by system processes—can provide an early warning sign of infection.

On a behavioral level, the rule remains simple but critical: treat any file attachment from an unknown WhatsApp contact with extreme suspicion. Legitimate businesses and government agencies rarely send executable scripts or installation files via instant messaging.

For those managing IT environments, ensuring that User Account Control (UAC) is set to the highest level of notification can prevent the silent privilege escalation that this specific malware relies upon.

The security community continues to monitor the evolution of these VBS-based payloads. As attackers refine their methods to mimic legitimate software updates, the next critical checkpoint will be the release of updated detection signatures from Microsoft Defender and other antivirus providers to automatically flag these specific MSI filenames and cloud-delivery patterns.

Have you encountered suspicious files in your messaging apps? Share your experience in the comments below and help others stay alert.

You may also like

Leave a Comment