The post Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web appeared on BitcoinEthereumNews.com. Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts. CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip.  They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload. Maverick malware loader hidden through classic obfuscation According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick. Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code.  Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials. Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users. How Maverick hijacks WhatsApp web CyberProof’s research… The post Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web appeared on BitcoinEthereumNews.com. Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts. CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip.  They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload. Maverick malware loader hidden through classic obfuscation According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick. Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code.  Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials. Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users. How Maverick hijacks WhatsApp web CyberProof’s research…

Cybersecurity researchers uncover malware targeting Brazilian users via WhatsApp Web

Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining Visual Basic Script and PowerShell with browser automation to hijack accounts and send malicious ZIP archives to contacts.

CyberProof’s SOC team investigated an incident where a suspicious file was downloaded through WhatsApp’s web interface. The file was a ZIP archive named NEW-20251001_152441-PED_561BCF01.zip. 

They recovered hashes SHA1 aa29bc5cf8eaf5435a981025a73665b16abb294e and SHA256 949be42310b64320421d5fd6c41f83809e8333825fb936f25530a125664221de. When victims execute a shortcut (LNK) inside the archive, it deobfuscates code to build and run either cmd or PowerShell, and the commands contact an attacker server to fetch the first stage payload.

Maverick malware loader hidden through classic obfuscation

According to a blog post published last Monday by the CyberProof research team, the loader has split tokens combined with Base64 and UTF‑16LE encoded PowerShell. It checks for reverse‑engineering tools, and if analysts are present, the loader self‑terminates. Otherwise, it downloads a worm called SORVEPOTEL and a banking trojan known as Maverick.

Trend Micro first documented Maverick, the banking trojan that monitors web activity, early last month, and linked it to an actor it calls Water Saci. SORVEPOTEL is a self‑propagating malware that spreads via WhatsApp Web by delivering the ZIP archive that carries malicious code. 

Maverick scans active browser tabs for URLs that match a hard‑coded list of Latin American financial institutions from Brazil. If a match appears, the trojan fetches follow‑on commands from a remote server and requests system data to send phishing pages meant to harvest credentials.

Anti-virus software company Kaspersky’s security team detected several code overlaps between Maverick and an older banking malware called Coyote. British security software Sophos said there is a possibility Maverick is an evolution of Coyote, but Kaspersky treats Maverick as a distinct threat to Brazil-based WhatsApp web users.

How Maverick hijacks WhatsApp web

CyberProof’s research stated that the campaign avoids .NET binaries in favor of VBScript and PowerShell. The ZIP archive contains an obfuscated VBScript downloader named Orcamento.vbs, which researchers tie to SORVEPOTEL. 

The VBScript executes a PowerShell command that runs tadeu.ps1 directly in memory, while PowerShell payload automates Chrome via ChromeDriver and Selenium. It takes over the victim’s WhatsApp Web session and distributes the malicious ZIP to all contacts.

The malware terminates any running Chrome processes and copies the legitimate Chrome profile to a temporary workspace before sending any messages. 

“This data includes cookies, authentication tokens, and the saved browser session, and allows the malware to bypass WhatsApp Web’s authentication to give a hacker immediate access to the victim’s WhatsApp account without any security alerts or QR code scanning,” American-Japanese cyber security software company Trend Micro surmised.

The script, after taking control of the Web app, displays a deceptive banner labeled “WhatsApp Automation v6.0” to hide its ongoing operations activity. The PowerShell code retrieves message templates from a command‑and‑control (C2) server and exfiltrates the victim’s contact list. 

The propagation loop iterates through every harvested contact before sending each message and after checking if the C2 has issued a pause command. Messages are personalized by substituting variables with time‑based greetings and contact names.

Trend Micro notes the campaign uses a sophisticated remote C2 that supports real‑time management. Operators can pause, resume and monitor propagation to run coordinated operations in infected hosts. 

Maverick Malware only deploys after confirming client is in Brazil 

Cyberproof and Trend Micro confirmed that Maverick installs only after confirming the host is in Brazil through checking the time zone, language, system region, and date and time format. The latter company also found that the chain restricts execution to Portuguese‑language systems. 

The C2 infrastructure includes email‑based channels, according to Trend Micro’s report, adding to its redundancy while making it hard to detect. CyberProof also found evidence the malware singled out hotels in Brazil. The security firms feared the actor may broaden its objectives to the hospitality industry, well frequented by targets of high value.

VirusTotal searches helped the team collect related samples and tie their findings to public research from Kaspersky, Sophos and Trend Micro. Yet, security firm CyberProof’s incident analysis revealed that the full infection chain could not be observed because files from the C2 failed to deliver during its investigation.

Join a premium crypto trading community free for 30 days – normally $100/mo.

Source: https://www.cryptopolitan.com/maverick-malware-takes-over-whatsapp-web/

Market Opportunity
Octavia Logo
Octavia Price(VIA)
$0.0124
$0.0124$0.0124
-9.48%
USD
Octavia (VIA) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment?

Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment?

The post Is Doge Losing Steam As Traders Choose Pepeto For The Best Crypto Investment? appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 17:39 Is dogecoin really fading? As traders hunt the best crypto to buy now and weigh 2025 picks, Dogecoin (DOGE) still owns the meme coin spotlight, yet upside looks capped, today’s Dogecoin price prediction says as much. Attention is shifting to projects that blend culture with real on-chain tools. Buyers searching “best crypto to buy now” want shipped products, audits, and transparent tokenomics. That frames the true matchup: dogecoin vs. Pepeto. Enter Pepeto (PEPETO), an Ethereum-based memecoin with working rails: PepetoSwap, a zero-fee DEX, plus Pepeto Bridge for smooth cross-chain moves. By fusing story with tools people can use now, and speaking directly to crypto presale 2025 demand, Pepeto puts utility, clarity, and distribution in front. In a market where legacy meme coin leaders risk drifting on sentiment, Pepeto’s execution gives it a real seat in the “best crypto to buy now” debate. First, a quick look at why dogecoin may be losing altitude. Dogecoin Price Prediction: Is Doge Really Fading? Remember when dogecoin made crypto feel simple? In 2013, DOGE turned a meme into money and a loose forum into a movement. A decade on, the nonstop momentum has cooled; the backdrop is different, and the market is far more selective. With DOGE circling ~$0.268, the tape reads bearish-to-neutral for the next few weeks: hold the $0.26 shelf on daily closes and expect choppy range-trading toward $0.29–$0.30 where rallies keep stalling; lose $0.26 decisively and momentum often bleeds into $0.245 with risk of a deeper probe toward $0.22–$0.21; reclaim $0.30 on a clean daily close and the downside bias is likely neutralized, opening room for a squeeze into the low-$0.30s. Source: CoinMarketcap / TradingView Beyond the dogecoin price prediction, DOGE still centers on payments and lacks native smart contracts; ZK-proof verification is proposed,…
Share
BitcoinEthereumNews2025/09/18 00:14
Prediction markets downplay Powell exit risk despite DOJ probe: Asia Morning Briefing

Prediction markets downplay Powell exit risk despite DOJ probe: Asia Morning Briefing

Traders on Polymarket and Kalshi are shrugging off the idea that a criminal investigation into the chair of the Federal Reserve would have him removed from his
Share
Coinstats2026/01/12 10:18
IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32