← Back to Tech & Science

Microsoft Warns of WhatsApp-Delivered VBS Malware Campaign

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

Microsoft issued a global security alert Tuesday regarding a sophisticated malware campaign utilizing WhatsApp to distribute Visual Basic Script (VBS) payloads that bypass Windows User Account Control (UAC) protections.

The technology giant's warning details a method in which attackers are leveraging the popular messaging platform to deliver malicious scripts directly to Windows users. Once executed, the VBS files are designed to hijack system processes by circumventing standard security prompts, granting unauthorized access to compromised devices.

The campaign targets users worldwide, with no specific geographic concentration identified in the initial advisory. Microsoft's security team noted that the attack vector exploits the trust users place in personal messaging channels, making the malicious content appear as legitimate file transfers from known contacts.

The malware operates by triggering a UAC bypass, a technique that allows the script to run with elevated privileges without triggering the standard warning dialog that typically alerts users to permission changes. This vulnerability allows the code to execute system-level commands, potentially leading to data theft, ransomware deployment, or the installation of additional malicious software.

Microsoft has not yet identified the specific threat actors responsible for the campaign or the ultimate objectives behind the attacks. The company stated that the motivation remains unclear, though the sophistication of the UAC bypass technique suggests a targeted operation rather than opportunistic spam.

Security researchers have observed that the VBS files are often disguised as common document types or compressed archives to evade initial scrutiny. Users who download and run these files inadvertently grant the malware the necessary permissions to operate within the operating system.

The company is urging users to exercise caution when receiving unexpected files via messaging applications, even from contacts they know. Microsoft recommends verifying the source of any file transfer before opening it and ensuring that Windows security settings are up to date.

No specific patch has been released to address the UAC bypass technique itself, as it relies on user interaction and social engineering rather than a software vulnerability in the operating system. However, Microsoft is working to improve detection capabilities for similar script-based attacks across its Defender platform.

The advisory comes as part of a broader effort to combat the increasing use of legitimate communication tools for cyberattacks. As messaging platforms become more integrated into daily workflows, they present new challenges for security teams attempting to distinguish between benign and malicious file transfers.

Questions remain regarding the scale of the campaign and whether any significant data breaches have already occurred. Microsoft has not provided statistics on the number of affected devices or the volume of malicious files distributed. The company continues to monitor the situation and will provide updates as more information becomes available.

Users are advised to report suspicious activity and to enable multi-factor authentication on all accounts to mitigate potential risks associated with compromised credentials.