Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnSquareMore
Maverick Malware May Hijack WhatsApp Web Accounts Targeting Brazil

Maverick Malware May Hijack WhatsApp Web Accounts Targeting Brazil

CoinotagCoinotag2025/11/12 15:24
By:Gideon Wolf
  • Maverick combines obfuscated scripts to download payloads like SORVEPOTEL worm, focusing on Brazilian users via time zone and language checks.

  • It automates Chrome to takeover WhatsApp sessions, sending personalized malicious messages to contacts without triggering alerts.

  • Linked to Water Saci actor, it monitors browser tabs for banking sites and deploys phishing pages, with overlaps to Coyote malware noted by experts.

Maverick malware threatens WhatsApp users in Brazil with account hijacking and credential theft—learn how it spreads via ZIP files and evades detection. Protect your accounts now with robust security measures. (152 characters)

What is Maverick Malware and How Does It Target WhatsApp Web Users?

Maverick malware is a banking trojan that infiltrates WhatsApp Web sessions to hijack accounts and target financial credentials from Brazilian institutions. Discovered by Trend Micro and linked to the Water Saci threat actor, it uses obfuscated VBScript and PowerShell to automate browser actions and spread via malicious ZIP archives. This self-propagating threat checks system settings to ensure deployment only in targeted regions, emphasizing its precision in attacks.

How Does Maverick Malware Hijack WhatsApp Accounts?

The infection begins with a ZIP archive downloaded through WhatsApp Web, containing an LNK shortcut that triggers obfuscated code to execute PowerShell commands. This loader contacts an attacker-controlled server to fetch payloads like the SORVEPOTEL worm and the Maverick banking trojan. It employs classic obfuscation techniques, such as split Base64 and UTF-16LE encoding, and self-terminates if reverse-engineering tools are detected, showcasing advanced anti-analysis measures.

CyberProof’s SOC team detailed in their investigation that the malware avoids .NET binaries, opting for VBScript named Orcamento.vbs tied to SORVEPOTEL. This script launches tadeu.ps1 in memory, which automates Chrome using ChromeDriver and Selenium to seize control of the WhatsApp session. By terminating existing Chrome processes and copying the legitimate profile, it accesses cookies and tokens to bypass authentication, granting hackers immediate access without QR code scans or alerts.

Once in control, the PowerShell payload displays a fake “WhatsApp Automation v6.0” banner to mask operations. It retrieves message templates from a command-and-control (C2) server, exfiltrates contacts, and sends personalized ZIP archives to each contact, incorporating time-based greetings and names for realism. Trend Micro highlighted the C2’s sophistication, enabling real-time pausing, resuming, and monitoring of propagation across infected systems.

Frequently Asked Questions

What Makes Maverick Malware a Threat to Brazilian WhatsApp Users?

Maverick malware specifically targets Brazil by verifying time zone, language, system region, and date formats before full deployment, restricting execution to Portuguese-language systems. It scans browser tabs for hard-coded URLs of Latin American financial institutions, then fetches phishing pages from remote servers to harvest credentials. This geofencing reduces noise and maximizes impact on high-value targets, as noted in analyses by CyberProof and Trend Micro. (98 words)

How Can Users Protect Themselves from Maverick Malware on WhatsApp Web?

To safeguard against Maverick malware, always verify unexpected file downloads on WhatsApp Web and avoid executing unknown ZIP archives or shortcuts. Enable two-factor authentication on WhatsApp, use antivirus software with real-time scanning, and keep browsers updated to block automation exploits. Regularly clear browser data and monitor for suspicious automation banners—if you spot unusual activity like automated messaging, immediately log out and scan your device for threats. (72 words)

Key Takeaways

  • Sophisticated Delivery: Maverick uses combined VBScript, PowerShell, and browser automation in ZIP files to hijack WhatsApp sessions seamlessly.
  • Targeted Attacks: Deployment is limited to Brazilian systems, focusing on financial credential theft from regional banks via phishing overlays.
  • Evolving Threat: With ties to Coyote and Water Saci, monitor for updates—implement strong security hygiene to prevent propagation to contacts.

Conclusion

The Maverick malware campaign underscores the growing risks to WhatsApp Web users in Brazil, leveraging obfuscated loaders and session hijacking to enable credential theft from financial institutions. As cybersecurity firms like CyberProof, Trend Micro, Sophos, and Kaspersky continue to track its evolution from threats like Coyote, users must prioritize vigilance against malicious downloads. Staying informed and adopting proactive defenses will be crucial as attackers refine these tactics for broader impact in the digital landscape.

In Case You Missed It: XRP May Form Market Bottom as Exchange Outflows Hit Record Highs
0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like

Ethereum News Today: Ethereum Faces $2,800 Test—Will It Surge to $3,000 or Retreat to $2,300?

- Ethereum tests $2,800 resistance, key threshold for November, with potential to rebound toward $3,000 if breakout succeeds. - Recent $55.7M inflow into ETH ETFs, led by Fidelity’s FBETH, signals cautious institutional interest after nine-day outflow streak. - Technical indicators show improved momentum with RSI rebound and MACD stabilization, but $2,800 remains critical for further gains. - Derivatives data and Coinbase’s ETH-backed lending expansion hint at conditional recovery, though liquidation risks

Bitget-RWA2025/11/23 07:08
Ethereum News Today: Ethereum Faces $2,800 Test—Will It Surge to $3,000 or Retreat to $2,300?

Ethereum Updates: Centralized DNS Compromise Highlights DeFi Weaknesses as Aerodrome Suffers $1 Million Loss

- Aerodrome Finance suffered a DNS hijacking attack on Nov 22, 2025, redirecting users to phishing sites that siphoned over $1M in assets through deceptive transaction approvals. - Attackers exploited vulnerabilities in centralized domain registrar Box Domains, forcing users to approve unlimited access to NFTs and stablecoins via two-stage signature requests. - The protocol shut down compromised domains, urged ENS-based access, and revoked recent token approvals, marking its second major front-end breach i

Bitget-RWA2025/11/23 07:08
Ethereum Updates: Centralized DNS Compromise Highlights DeFi Weaknesses as Aerodrome Suffers $1 Million Loss

Trump and Mamdani’s Bet on Affordability: Uniting Opposing Ideologies

- Trump and Mamdani's Nov. 21 meeting highlights clashing ideologies on affordability and governance, with New York's $1.286T economy at stake. - Both leaders share focus on cost-of-living crises but differ sharply on solutions, with Trump threatening federal funding cuts and Mamdani advocating rent freezes. - Experts see the dialogue as critical for redefining strained city-federal relations, emphasizing urban centers' role as economic engines. - Mamdani's corporate tax proposals clash with Trump's deregu

Bitget-RWA2025/11/23 06:52
Trump and Mamdani’s Bet on Affordability: Uniting Opposing Ideologies

Bitcoin News Update: Navigating Crypto’s Balancing Act to Steer Clear of 2018’s Downturn as Global Economic Conditions Evolve

- Crypto markets avoid 2018-style collapse as macro-driven cycles and reduced speculation prolong volatility, per Lyn Alden. - Fed policy uncertainty and leveraged ETF launches highlight risks and innovations amid $2.2B crypto outflows and $914M liquidations. - MSTR's BTC gains and Gunden's $1.3B sell-off reflect divergent investor strategies, while Munari's Solana project targets long-term adoption. - Analysts split between 65-70% Bitcoin retracement forecasts and prolonged cycles driven by institutional

Bitget-RWA2025/11/23 06:52
Bitcoin News Update: Navigating Crypto’s Balancing Act to Steer Clear of 2018’s Downturn as Global Economic Conditions Evolve