WhatsApp Voice Message Phishing Emails Push Info-stealing Malware
A new WhatsApp phishing campaign impersonating WhatsApp’s voice message feature has been discovered, attempting to spread information-stealing malware to at least 27,655 email addresses.
This phishing campaign aims to lead the recipient through a series of steps that will ultimately end with the installation of an information-stealing malware infection, opening the way to credential theft.
Information-stealing malware is aggressively distributed today via various means, with phishing remaining a primary channel for threat actors.
The information stolen by these special-purpose malware tools is predominately account credentials stored in browsers and applications but also targets cryptocurrency wallets, SSH keys, and even files stored on the computer.
WhatsApp voice messages as a lure
The new WhatsApp voice message phishing campaign was discovered by researchers at Armorblox, who are constantly on the lookout for new phishing threats.
For years, WhatsApp has had the ability to send voice messages to users in groups and private chats, with the feature receiving new enhancements last week.
Also Read: How do ransomware attacks happen?: Here are 7 ways to protect you from it
A timely phishing attack pretends to be a notification from WhatsApp stating that they received a new private message. This email features an embedded “Play” button and audio clip duration and creation time details.
The sender, masquerading as a “Whatsapp Notifier” service, is using an email address belonging to the Center for Road Safety of the Moscow Region.
Due to this being a genuine and legitimate entity, the messages aren’t flagged or blocked by email security solutions, which typically is the biggest problem for phishing actors.
Armorblox believes this is a case of the hackers having somehow exploited the domain to promote their purpose, so the organization plays a role without knowledge.
If the recipient clicks on the “Play” button in the message body, they are redirected to a website that serves an allow/block prompt for installing a JS/Kryptic trojan.
To trick the victim into clicking on “Allow,” the threat actors display a web page stating that you need to click ‘Allow’ to confirm you are not a robot. However, clicking these allow buttons will subscribe the user to browser notifications that send in-browser advertisements for scams, adult sites, and malware.
This simple trick can be very effective with people who are not consciously aware or thinking twice about their actions online.
Once the “allow” option is pressed, the browser will prompt the user to install the payload, which in this case is an information-stealing malware.
How to protect yourself
The fact that the emails in this campaign bypassed numerous secure email solutions makes it a particularly nasty case, but the clues that it was phishing were still abundant.
Also Read: The Data Protection Act of Singapore and how it affects businesses
First, the email address has nothing to do with WhatsApp, and the same goes for the landing URL that requests the victims to click “Allow” to confirm they’re real. They are both obviously out of WhatsApp’s domain space.
Secondly, voice messages received on WhatsApp are downloaded automatically in the client app, so the IM company would never inform you about receiving one via email.
Thirdly, the phishing email features no WhatsApp logo, which is almost certainly to avoid having trouble with the VMC checks introduced by Gmail last year.
To protect yourself from phishing attempts, always take your time to look into potential signs of fraud when receiving messages that make surprising claims, and never jump into action.
If you need to check something, do it yourself through the official website or application, and never by following URLs or instructions provided in the message.