Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
Maverick Malware May Hijack WhatsApp Web Accounts Targeting Brazil

Maverick Malware May Hijack WhatsApp Web Accounts Targeting Brazil

CoinotagCoinotag2025/11/12 15:24
By:Gideon Wolf
  • Maverick combines obfuscated scripts to download payloads like SORVEPOTEL worm, focusing on Brazilian users via time zone and language checks.

  • It automates Chrome to takeover WhatsApp sessions, sending personalized malicious messages to contacts without triggering alerts.

  • Linked to Water Saci actor, it monitors browser tabs for banking sites and deploys phishing pages, with overlaps to Coyote malware noted by experts.

Maverick malware threatens WhatsApp users in Brazil with account hijacking and credential theft—learn how it spreads via ZIP files and evades detection. Protect your accounts now with robust security measures. (152 characters)

What is Maverick Malware and How Does It Target WhatsApp Web Users?

Maverick malware is a banking trojan that infiltrates WhatsApp Web sessions to hijack accounts and target financial credentials from Brazilian institutions. Discovered by Trend Micro and linked to the Water Saci threat actor, it uses obfuscated VBScript and PowerShell to automate browser actions and spread via malicious ZIP archives. This self-propagating threat checks system settings to ensure deployment only in targeted regions, emphasizing its precision in attacks.

How Does Maverick Malware Hijack WhatsApp Accounts?

The infection begins with a ZIP archive downloaded through WhatsApp Web, containing an LNK shortcut that triggers obfuscated code to execute PowerShell commands. This loader contacts an attacker-controlled server to fetch payloads like the SORVEPOTEL worm and the Maverick banking trojan. It employs classic obfuscation techniques, such as split Base64 and UTF-16LE encoding, and self-terminates if reverse-engineering tools are detected, showcasing advanced anti-analysis measures.

CyberProof’s SOC team detailed in their investigation that the malware avoids .NET binaries, opting for VBScript named Orcamento.vbs tied to SORVEPOTEL. This script launches tadeu.ps1 in memory, which automates Chrome using ChromeDriver and Selenium to seize control of the WhatsApp session. By terminating existing Chrome processes and copying the legitimate profile, it accesses cookies and tokens to bypass authentication, granting hackers immediate access without QR code scans or alerts.

Once in control, the PowerShell payload displays a fake “WhatsApp Automation v6.0” banner to mask operations. It retrieves message templates from a command-and-control (C2) server, exfiltrates contacts, and sends personalized ZIP archives to each contact, incorporating time-based greetings and names for realism. Trend Micro highlighted the C2’s sophistication, enabling real-time pausing, resuming, and monitoring of propagation across infected systems.

Frequently Asked Questions

What Makes Maverick Malware a Threat to Brazilian WhatsApp Users?

Maverick malware specifically targets Brazil by verifying time zone, language, system region, and date formats before full deployment, restricting execution to Portuguese-language systems. It scans browser tabs for hard-coded URLs of Latin American financial institutions, then fetches phishing pages from remote servers to harvest credentials. This geofencing reduces noise and maximizes impact on high-value targets, as noted in analyses by CyberProof and Trend Micro. (98 words)

How Can Users Protect Themselves from Maverick Malware on WhatsApp Web?

To safeguard against Maverick malware, always verify unexpected file downloads on WhatsApp Web and avoid executing unknown ZIP archives or shortcuts. Enable two-factor authentication on WhatsApp, use antivirus software with real-time scanning, and keep browsers updated to block automation exploits. Regularly clear browser data and monitor for suspicious automation banners—if you spot unusual activity like automated messaging, immediately log out and scan your device for threats. (72 words)

Key Takeaways

  • Sophisticated Delivery: Maverick uses combined VBScript, PowerShell, and browser automation in ZIP files to hijack WhatsApp sessions seamlessly.
  • Targeted Attacks: Deployment is limited to Brazilian systems, focusing on financial credential theft from regional banks via phishing overlays.
  • Evolving Threat: With ties to Coyote and Water Saci, monitor for updates—implement strong security hygiene to prevent propagation to contacts.

Conclusion

The Maverick malware campaign underscores the growing risks to WhatsApp Web users in Brazil, leveraging obfuscated loaders and session hijacking to enable credential theft from financial institutions. As cybersecurity firms like CyberProof, Trend Micro, Sophos, and Kaspersky continue to track its evolution from threats like Coyote, users must prioritize vigilance against malicious downloads. Staying informed and adopting proactive defenses will be crucial as attackers refine these tactics for broader impact in the digital landscape.

In Case You Missed It: XRP May Form Market Bottom as Exchange Outflows Hit Record Highs
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Bitcoin News Today: Bitcoin Poised for Major Move: Will It Surge or Plunge at $108K?

- Bitcoin consolidates near $104.5K, below $108K resistance, as tightening Bollinger Bands signal potential breakout. - A $108K+ break could drive BTC to $110K-$112K with ETF inflows and reduced miner selling pressure supporting accumulation. - Failure to hold $104K support risks a pullback to $100.5K, with soft ETF demand or renewed miner sales as key triggers. - Solar stocks like Emeren and Canadian Solar draw equity market attention amid mixed earnings and debt concerns.

Bitget-RWA2025/11/12 20:04
Bitcoin News Today: Bitcoin Poised for Major Move: Will It Surge or Plunge at $108K?

Tokenized Equities Climb to $10 Billion, Putting Regulators in a Legal Gray Area

- Kraken's xStocks platform, a joint venture with Backed, surpassed $10B in transaction volume four months post-launch, tokenizing equities like Tesla and Meta . - The platform enables 24/7 trading and fractional ownership across Ethereum , Solana , BNB Chain, and Tron , with $2B in onchain activity and 45,000 holders. - Legal ambiguity persists as tokenized stocks are treated as derivatives, not direct securities, with experts warning of liquidity risks and regulatory challenges. - Kraken's cautious focus

Bitget-RWA2025/11/12 20:04

Bitcoin Updates: Dubai Court's $456 Million Asset Freeze Marks a Turning Point in International Crypto Regulation

- Dubai's Digital Economy Court froze $456M in TrueUSD reserves, alleging mismanagement by Aria Commodities, a firm controlled by Matthew Brittain. - Funds were transferred via Hong Kong-based First Digital Trust between 2021-2022, sparking legal disputes over whether reserves were converted to illiquid assets. - The ruling underscores global regulatory focus on stablecoin transparency, as Techteryx claims constructive trust while Aria faces scrutiny over opaque transactions. - Trump-linked entities like A

Bitget-RWA2025/11/12 20:04
Bitcoin Updates: Dubai Court's $456 Million Asset Freeze Marks a Turning Point in International Crypto Regulation

COAI's Sudden Price Decline: Managing Immediate Fluctuations and Sustained Strength

- COAI Index fell 54% by November 2025 due to C3.ai's $116.8M loss, lawsuits, and regulatory uncertainty from the CLARITY Act. - Short-term selloffs were amplified by sector-wide risk aversion, though Binance's smart money account profited $3.125M from COAI trades. - Long-term resilience stems from 50+ corporate partnerships advancing AI adoption and indirect benefits from rising AI R&D investments in biotech . - Investors must balance regulatory risks with COAI's ecosystem strength, as C3.ai's struggles c

Bitget-RWA2025/11/12 20:04
COAI's Sudden Price Decline: Managing Immediate Fluctuations and Sustained Strength