What's Happening?
A malware campaign known as Water Saci has been identified as targeting WhatsApp users by spreading a backdoor malware called SORVEPOTEL. This malware propagates by compromising victims' WhatsApp Web sessions
and sending malicious ZIP files to their contacts. The campaign primarily targets users in Brazil, using messages in Portuguese. The malware employs an email-based command-and-control system to execute backdoor functionalities, such as running commands, exfiltrating files, and taking screenshots. Researchers have noted similarities between Water Saci and the Coyote banking trojan, suggesting a possible connection.
Why It's Important?
The Water Saci campaign highlights the evolving threat landscape for digital communication platforms like WhatsApp. By exploiting WhatsApp's web sessions, the malware can spread rapidly among users, posing significant risks to personal and organizational data security. The use of an email-based command-and-control system indicates a sophisticated approach to maintaining persistence and control over infected systems. This development underscores the need for enhanced cybersecurity measures, particularly for users in regions like Brazil, where the campaign is concentrated. Organizations and individuals must remain vigilant and adopt recommended security practices to mitigate such threats.
What's Next?
To counter the threat posed by Water Saci, cybersecurity experts recommend disabling automatic downloads on WhatsApp and restricting file transfers on organizational devices. Users are also advised to log out of messaging apps when not in use and regularly clear browser cookies and tokens to prevent session hijacking. As the campaign evolves, further research and monitoring will be crucial to understanding its full impact and developing effective countermeasures. Stakeholders, including cybersecurity firms and communication platforms, may need to collaborate to enhance security protocols and user awareness.











