WhatsApp Malvertising Campaign Delivers VBScript and MSI Backdoors

Summary: Microsoft Security Blog reports on a campaign using WhatsApp to distribute VBS files that establish MSI backdoors on infected systems, employing techniques of deception and cloud services.

Microsoft describes a campaign that starts on WhatsApp and ends in a multi-stage infection chain designed for persistence and remote access. The detail that makes the case particularly unsettling is the use of a common and reliable platform as an entry point, combining messaging, social engineering, and system utilities to evade early detection.

According to the analysis, attackers distribute VBS files that download new stages from cloud services such as AWS, Tencent Cloud, and Backblaze B2. Then, they employ renamed Windows tools to blend into normal computer activity before concluding with the installation of malicious MSI packages that consolidate control over the compromised system.

The significance of the case lies in how it combines familiar techniques within a highly believable flow for the victim. It does not rely on a single new technical innovation but rather on the sum of deception, camouflage, and abuse of legitimate infrastructure, a pattern that often proves more effective than noisy attacks.

For defensive teams, the story delivers a straightforward conclusion: reliable communication platforms are already part of the malware distribution map, and the use of legitimate cloud services makes the line between normal activity and malicious activity even blurrier.

Key facts

  • Campaign delivers VBS payloads and MSI backdoors via WhatsApp.
  • Malicious files mimic legitimate Windows utilities to blend into normal system activity.
  • Payloads hosted on trusted cloud services like AWS, Tencent Cloud, Backblaze B2.

Why it matters

This campaign underscores the need for continuous monitoring and robust security measures, as attackers are using reliable communication platforms to distribute sophisticated malware.

Embedded content for: WhatsApp Malvertising Campaign Delivers VBScript and MSI Backdoors