Tech·Nerdo
LatestReviewsGuidesComparisonsDeals
Search⌘K
Est. 2026 · 178 stories in printNews · Cybersecurity
Home/Latest/Cybersecurity/Microsoft Warns: WhatsApp on Windows Hit by VBS Malware Cam…
010
NewsMicrosoft Warns: What…
FiledApr 27 · 2026
Read5 min · 1,000 words
Bylineomer-yld
NewsCybersecurity·5 min read·Apr 27, 2026

Microsoft Warns: WhatsApp on Windows Hit by VBS Malware Campaign

Microsoft Defender flagged an active campaign delivering malicious .vbs attachments through WhatsApp Desktop on Windows. The malware uses built-in Windows tools to install MSI backdoors that most antivirus misses. Here's how it works and how to stay safe.

OY
Omer YLD
Founder & Editor-in-Chief
Apr 27, 20265 min · 1,000 words
WhatsApp Desktop window on Windows with a red warning shield over an attachment — illustration of the 2026 VBS malware campaignIllustration · Technerdo
Above → WhatsApp Desktop window on Windows with a red warning shield over an attachment — illustration of the 2026 VBS malware campaign
Illustration · Technerdo

Microsoft Defender disclosed an active malware campaign delivering malicious VBScript (.vbs) attachments through WhatsApp Desktop on Windows, with Malwarebytes corroborating the threat and The Hacker News reporting renewed activity through April. The campaign is unusually clean: it uses built-in Windows binaries to do its dirty work, which means most antivirus engines never raise a flag.

If you use WhatsApp Desktop on a Windows PC — and especially if you're on Windows 10 or 11 with default file-extension settings — this one's worth a five-minute read.

The Briefing3Things to watch

What we're tracking

  • The lure: a contact (often a hijacked friend's account) sends what looks like an image, document, or "zip" attachment over WhatsApp Desktop. The actual file is a .vbs script Windows hides the extension on by default.
  • Living-off-the-land: when run, the script copies legitimate built-in Windows tools (LOLBins) into a hidden folder under fake names, then pulls follow-on payloads from AWS, Tencent Cloud, and Backblaze — traffic that looks like normal cloud activity to security tools.
  • The payload: an MSI backdoor with persistence, UAC bypass, and remote-control capability. Most antivirus engines don't catch the chain because every individual step uses signed Microsoft binaries.

What's actually happening

The campaign — first flagged by Microsoft in late March and still running as of this week — starts with a WhatsApp message from someone in your contacts. Because the sender is usually a real friend whose account was previously hijacked, the message passes the human-trust filter that defeats most phishing.

The attachment looks like an image preview or a "document" — but the real file is named something like IMG_2026_April.jpg.vbs or Invoice_2026.pdf.vbs. Windows hides the .vbs extension by default, so the user sees IMG_2026_April.jpg and double-clicks expecting an image. What runs instead is a Visual Basic script.

That's where the campaign gets clever. The .vbs file doesn't drop obvious malware. It:

  1. Copies several legitimate Windows binaries — PowerShell, mshta.exe, regsvr32.exe, bitsadmin.exe — to a hidden folder under disguised filenames.
  2. Calls those copied binaries to download follow-on payloads from AWS S3, Tencent Cloud, and Backblaze B2 — public cloud services that no firewall blocks.
  3. Installs a Microsoft Installer (.msi) package as the final payload, which establishes persistence (registers a scheduled task), bypasses UAC via a known Windows trick, and opens a remote-control channel.

This is "living off the land" — every executable in the chain is signed by Microsoft. There's no novel malware binary for antivirus to fingerprint, no malicious certificate to revoke, no obviously bad domain to block. From a network-monitoring perspective the traffic looks identical to a developer using AWS or a user on a Tencent cloud app.

Why the WhatsApp angle matters

Two reasons this campaign hits harder than the average .vbs phishing wave:

Trust laundering through a hijacked contact. Most phishing arrives from an unknown sender — a fake Amazon, an "IT support" call, a stranger's email. WhatsApp messages come from people you already talk to. When your cousin sends a "look at this" attachment, your skepticism is at floor level. The campaign deliberately recycles compromised accounts so the lure always lands inside an existing conversation.

Windows hides the real extension. WhatsApp Desktop on Windows accepts attachments and, when downloaded, they land in your Downloads folder. Windows 10/11 ship with Hide extensions for known file types on by default, so a file called report.pdf.vbs shows up as report.pdf with a script icon you'd have to be looking for. Older or less-technical users who reflexively double-click whatever a friend sends are the meat of this campaign's victim pool.

What to do — 60 seconds of hardening

Three changes block this entire family of attack:

  1. Show file extensions in Windows. Open File Explorer → View → Show → File name extensions. Tick it. Now .vbs files show as .vbs. This single change defeats most "image-that's-actually-a-script" lures.
  2. Disable WhatsApp Desktop's auto-download for media from unknown senders if your version supports it. At minimum, never open an attachment that ends in .vbs, .js, .bat, .cmd, .scr, .lnk, or .iso. None of those are images. None are documents.
  3. Run a current Microsoft Defender scan. As of the late-March advisory, Defender detects the chain by behavior even though individual binaries are signed. Open Windows Security → Virus & threat protection → Quick scan. Make sure real-time protection and tamper protection are both on.

If you suspect you opened a malicious .vbs attachment recently:

  • Disconnect from the network
  • Run a full Defender scan (and a second-opinion tool like Malwarebytes Free)
  • Change passwords for any account you logged into on that PC since the attachment ran — especially WhatsApp, banking, and email
  • Check Task Scheduler for unfamiliar scheduled tasks
  • If the machine had any sensitive credentials saved in browser, treat them as potentially exposed

For a deeper general hardening guide, see our piece on how to spot AI-driven phishing in 2026.

What's next

Microsoft hasn't attributed the campaign to a specific actor publicly, but the infrastructure pattern (multi-cloud staging, legitimate-tool abuse, Spanish and Portuguese language lures most prominent) overlaps with several Latin American banking-trojan crews that have been retooling toward LOLBin-heavy chains since 2024. Expect copycat campaigns within weeks — the playbook is now public, and the success rate against unprotected Windows installs is high enough that other crews will copy the WhatsApp delivery angle.

The longer-term fix is on Microsoft and Meta. Microsoft has been gradually deprecating VBScript across Windows 11 and the latest 24H2 servicing branch will eventually disable it by default — but "eventually" is doing a lot of work in that sentence; the deadline keeps slipping. Meta could close the WhatsApp Desktop attack surface by implementing stricter attachment-type policies on the desktop client, but has shown no public sign of doing so.

Until those things happen, the burden is on users: turn on file extensions, treat any unexpected attachment from any sender — including friends — as a potential threat, and remember that "from someone you trust" stopped being a meaningful security signal a long time ago.

Filed underWhatsappWindowsMalwarePhishingNews2026
OY
About the writer

Omer YLD

Founder & Editor-in-Chief

Omer YLD is the founder and editor-in-chief of Technerdo. A software engineer turned tech journalist, he has spent more than a decade building web platforms and dissecting the gadgets, AI tools, and developer workflows that shape modern work. At Technerdo he leads editorial direction, hands-on product testing, and long-form reviews — with a bias toward clear writing, honest verdicts, and tech that earns its place on your desk.

  • Product Reviews
  • AI Tools & Developer Workflows
  • Laptops & Workstations
  • Smart Home
  • Web Development
  • Consumer Tech Analysis
All posts →Website
Was this piece worth your five minutes?

Join the conversation — sign in to leave a comment and engage with other readers.

Sign InCreate Account

Loading comments...

More from Cybersecurity

All Cybersecurity coverage →
ADT logo on a darkened smart home control panel — editorial illustration of the 2026 data breach disclosureNews
Cybersecurity

ADT Confirms Data Breach Exposing 5.5M Customers — Here's What to Do

Apr 27 · 5 min
Signal app icon with a glowing blue shield and a red phishing hook icon — illustration of the 2026 Signal phishing campaignNews
Cybersecurity

Signal Isn't Broken — But Russia-Linked Phishing Is Hitting Senior Officials

Apr 27 · 5 min
Vercel headquarters sign and cloud deployment dashboard representing the April 2026 data breachNews
Cybersecurity

Vercel Confirms Breach via Context AI Hack, Stolen Data Listed for $2M

Apr 21 · 5 min
Share
The Technerdo Weekly

Analysis worth reading, delivered every Monday.

One carefully written email a week. Features, deep dives, and the stories buried under press-release noise. No daily clutter.

One email a week · Unsubscribe any time · No affiliate-only promos
Tech·Nerdo

Independent tech reviews, comparisons, guides, and the best deals worth your time. Built for nerds, by nerds.

Sections

LatestReviewsGuidesComparisonsDeals

Topics

AISmartphonesLaptopsSmart HomeCybersecurity

About

AboutContactPrivacyTermsAffiliate disclosure
© 2026 Technerdo Media · Built for nerds, by nerds.
· Since 2016 ·