Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Promoting global and environmental health research in Canada

India’s Kuku nabs $85 million as mobile content wars heat up

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Researchers warn about self-reinforced WhatsApp malware named Sorvepotel
Identity

Researchers warn about self-reinforced WhatsApp malware named Sorvepotel

userBy userOctober 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 3, 2025Ravi LakshmananMalware/Online Security

Brazilian users are emerging as targets for new self-propagation malware spread through the popular messaging app WhatsApp.

The campaign codenamed Sorvepotel by Trend Micro, armed with trust on the platform to extend reach across Windows systems, adding that the attacks are “designed for speed and propagation” rather than data theft or ransomware.

“Sorvepotel has been observed to spread across Windows systems by persuading phishing messages with malicious ZIP attachments,” said researchers Jeffrey Francis Bonaobra, Maristel Policarpio, Sophia Nilette Robles, CJ Arsley Mateo, Jacob Santos and Paul John Bardon.

“Interestingly, phishing messages containing attachments of malicious files suggest that users need to open it on the desktop and that threat actors may be more interested in targeting businesses than consumers.”

Once the attachment is opened, the malware is automatically propagated through the desktop web version of WhatsApp, and ultimately banned infected accounts because they will participate in excessive spam. There is no indication that the threat actor has leveraged access to encrypt Exfiltrate data or files.

The majority of infectious diseases (457 out of 477 cases) are concentrated in Brazil, with entities in the government, public services, manufacturing, technology, education and construction sectors having the most impact.

CIS Build Kit

The starting point for the attack is a phishing message sent from WhatsApp’s already compromised contacts. This message contains a zip attachment that disguises it as a seemingly harmless receipt or a health app-related file.

That said, there is evidence to suggest that the operator behind the campaign used email to distribute ZIP files from seemingly legitimate email addresses.

If the recipient drops on the trick and opens an attachment, they are invited to open a Windows Shortcut (LNK) file. This quietly triggers the execution of a PowerShell script to retrieve the main payload from an external server at startup (e.g. Sorvetenopoate[.]com).

The downloaded payload is a batch script designed to establish host persistence by automatically copying it to the Windows Startup folder, and is automatically launched following the start of the system. It is also designed to run PowerShell commands that reach the Command and Control (C2) server to get further instructions or additional malicious components.

At the heart of Sorvepotel’s operation is the propagation mechanism focused on WhatsApp. When Malware detects that WhatsApp Web is active on an infected system, it can distribute malicious ZIP files to all contacts and groups associated with the victim’s compromised account, and spread them quickly.

“This automated spread leads to a large number of spam messages and frequently leads to account suspension or banning due to violation of WhatsApp’s terms of service,” Trend Micro said.

“The Sorvepotel campaign shows how threat actors can increasingly leverage popular communication platforms like WhatsApp to achieve rapid, large-scale malware propagation with minimal user interaction.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow developers use Apple’s local AI model on iOS26
Next Article Apple removes ice blocks and similar tracking apps from the App Store
user
  • Website

Related Posts

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

October 16, 2025

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Promoting global and environmental health research in Canada

India’s Kuku nabs $85 million as mobile content wars heat up

CISA reports flaw in Adobe AEM with perfect 10.0 score – already under active attack

Seoul considers approving high-resolution map requests from Google and Apple

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.