Security5 min readThe Hacker News

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

P
Redakcja Pixelift0 views
Share
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Foto: The Hacker News

Cybercriminals have found a way to take control of the Windows system, using the popular WhatsApp messenger as the primary distribution tool for VBS-type malware. According to the latest report from Zscaler ThreatLabz, the new malware campaign relies on a sophisticated UAC Bypass mechanism, which allows hackers to escalate privileges without the user's knowledge or interaction. The use of artificial intelligence has drastically shortened human response times, making remote access the fastest path to a data security breach. The attack begins with the transmission of an infected file via WhatsApp, which lowers the guard of victims accustomed to secure end-to-end encryption communication. Once the script is executed, the system does not display the standard User Account Control warning, enabling attackers to fully take over the workstation. For the global user community, this necessitates extreme caution when receiving files from unknown senders, even within trusted applications. In the era of AI-driven attacks, traditional identity verification methods are becoming insufficient, and implementing Zero Trust architecture and regular Microsoft security updates are becoming key elements of protection. Effective defense today requires not only antivirus software but, above all, a change in habits regarding digital correspondence, which is increasingly becoming a Trojan horse for corporate networks.

The cyber threat landscape in 2026 has undergone a drastic evolution, and the line between private and corporate communication has almost completely blurred. Microsoft has just issued a critical warning regarding a new, sophisticated malware campaign that utilizes the popular messenger WhatsApp as its primary attack vector. Incidents recorded at the end of February 2026 indicate a return to classic but extremely effective script-based infection methods, which this time are able to silently bypass operating system defense mechanisms.

The attack relies on the distribution of malicious Visual Basic Script (VBS) files, which, when launched by an unsuspecting user, initiate a multi-stage infection process. What sets this operation apart from others is the precise exploitation of a vulnerability in User Account Control (UAC). By bypassing this mechanism, attackers are able to gain administrative privileges without displaying the standard dialog box requesting action confirmation, making the attack nearly invisible to the average Windows user.

Infection Mechanism via Instant Messengers

The use of WhatsApp as a delivery platform is not accidental. In an environment where email is saturated with anti-spam filters and EDR class systems, mobile and desktop messengers remain a relatively poorly monitored channel. Although Microsoft has not yet revealed the exact content of the lures used by hackers, the operational scheme is clear: the user receives a message prompting them to download and open an attachment or click a link leading to a VBS file.

Malware attack scheme via WhatsApp
Modern malware campaigns exploit trust in communication platforms to bypass traditional network security.

After activating the script, the system undergoes a multi-stage procedure aimed at establishing so-called persistence, meaning a permanent presence in the infected environment. This means that the malicious code can survive a computer restart by hiding in the system registry or scheduled tasks. However, the key goal of the attackers is to enable remote access, which opens the way for full data exfiltration or the deployment of ransomware.

  • VBS Malware: Utilization of Visual Basic scripts to automate attack processes.
  • UAC Bypass: Bypassing User Account Control to obtain high privileges.
  • WhatsApp Delivery: Using an encrypted messenger to bypass email security gateways.
  • Multi-stage Infection: Complex attack structure making detection by antiviruses difficult.

The Role of AI in Shortening Human Response Time

According to the Zscaler ThreatLabz 2026 VPN Risk Report, developed in collaboration with Cybersecurity Insiders, the presence of artificial intelligence in the cybercriminals' arsenal has drastically changed the dynamics of clashes in cyberspace. AI has "collapsed" the time window in which a human is able to reserve a reaction to an incident. In a world where scripts generated by language models can adapt to the victim's environment in real-time, traditional defense methods are becoming insufficient.

The Zscaler analysis indicates that remote access has become the "fastest path to breach." In the context of the campaign detected by Microsoft, the administrative access obtained through UAC Bypass allows attackers to move within the corporate network at a speed that precludes manual intervention by IT administrators. Malicious VBS files are merely the key to the door, which, once opened, allows for the lightning-fast takeover of infrastructure.

Remote access threat
Remote access remains the primary target for criminal groups seeking to penetrate corporate networks.

It is worth noting that the UAC Bypass technique is not new; however, its implementation in the form of a VBS script delivered via WhatsApp demonstrates a high degree of attack optimization for end-user psychology. People subconsciously trust messages received on mobile platforms more than those in their email inbox, making this vector exceptionally dangerous in the era of hybrid work.

Threat to VPN-based Infrastructure

The Zscaler ThreatLabz report also sheds light on the weaknesses of VPN systems when facing modern malware. Once malware gains administrative privileges on a workstation, every established VPN session becomes a bridge through which the infection can spread to cloud resources and the company's internal servers. This phenomenon is particularly dangerous when attackers use remote access to copy credentials directly from the system memory.

"AI has drastically shortened the time needed to conduct an attack, making remote access the most effective weapon in the hands of hackers." – Zscaler ThreatLabz 2026 VPN Risk Report.

Security infrastructure must evolve toward Zero Trust models, where the device and the messenger session themselves are not considered trustworthy simply because they are within the corporate ecosystem. The case of the WhatsApp-VBS campaign shows that even the most advanced operating systems, such as Windows, have touchpoints that, with appropriate social engineering, can become the Achilles' heel of the entire organization.

The effectiveness of this campaign relies on simplicity: VBS files are natively supported by Windows, eliminating the need to download additional libraries or complex loaders in the first phase of the attack. This "living off the land" (LotL) approach means that this activity often evades simple signature scanners that focus on detecting known .exe executables.

A New Era of Shadow Boxing

The campaign detected by Microsoft at the end of February 2026 is a wake-up call for security departments worldwide. Attackers have stopped relying on mass mailings, choosing more direct and intimate communication channels like WhatsApp. The integration of malicious VBS scripts with UAC Bypass techniques allows them to bypass fundamental Windows security barriers, which, combined with AI-driven automation, creates an explosive mixture.

The key challenge for organizations will now be implementing systems capable of real-time behavioral analysis of scripts and a rigorous approach to privilege management policy. Since remote access has become the fastest route to data leaks, priority must be given to process isolation and monitoring unusual activities originating from communication applications that were previously treated as low-risk tools. The era where securing email and a firewall was enough has definitively ended.

Comments

Loading...