WhatsApp Under Siege: How 'Maverick' Malware Is Hijacking Brazilian Banking Accounts

WhatsApp Under Siege: How 'Maverick' Malware Is Hijacking Brazilian Banking Accounts
Photo by Brett Jordan / Unsplash

Executive Summary

A sophisticated malware campaign dubbed "Water Saci" is leveraging WhatsApp's massive user base in Brazil to deploy banking trojans that hijack browser sessions and steal financial credentials. With 148 million WhatsApp users in Brazil representing 98% of smartphone users with the messaging app, cybercriminals have found the perfect vector for mass-scale propagation. The campaign combines two primary malware components—SORVEPOTEL and Maverick—that work in tandem to compromise WhatsApp Web sessions, disable security software, and target over 65 Latin American financial institutions.

The Perfect Storm: Why Brazil?

Brazil represents the second-largest WhatsApp market globally, creating an ideal environment for social engineering attacks. The campaign has concentrated heavily in Brazil, accounting for 457 of 477 recorded infections, with most victims in government and public service sectors, though manufacturing, education, banking, technology, and construction sectors have also been affected.

The country's cybersecurity landscape is uniquely challenging. Brazilian Portuguese-specific cybercriminal communities enable a localized domestic threat, with actors relying significantly on mobile apps and social media platforms like Telegram and WhatsApp rather than traditional underground forums. This ecosystem has fostered a mentoring culture where experienced threat actors teach new members, accelerating the sophistication of attacks.

The Attack Architecture: A Two-Pronged Assault

Component 1: SORVEPOTEL - The Self-Propagating Worm

SORVEPOTEL is a self-propagating malware spread via the desktop web version of WhatsApp and is used to deliver a ZIP archive containing the Maverick payload. The worm's propagation mechanism is particularly insidious:

Initial Infection Vector:

  • Victims receive WhatsApp messages from compromised contacts—typically friends or colleagues
  • Messages contain ZIP archives disguised as legitimate documents (receipts, health forms, quotations)
  • File names follow patterns like "Orcamento-2025[8 random digits].zip"
  • Alternative distribution: There is evidence that operators have also used emails to distribute ZIP files from seemingly legitimate email addresses, expanding the attack surface beyond WhatsApp alone

WhatsApp Web Hijacking: The malware terminates existing Chrome processes and clears old sessions before copying the victim's legitimate Chrome profile data to its temporary workspace, including cookies, authentication tokens, and saved browser sessions. This technique bypasses WhatsApp Web's authentication entirely, gaining immediate access without triggering security alerts or requiring QR code scanning.

WhatsApp Disrupts Spyware Campaign Targeting Journalists and Civil Society Members
WhatsApp, the popular messaging platform owned by Meta, has successfully thwarted a hacking campaign that targeted approximately 90 users, including journalists and members of civil society[1][2]. The company has linked this campaign to Paragon, an Israeli spyware firm that was recently acquired by the American private equity giant

The automation is sophisticated, leveraging browser automation tools like Selenium to control WhatsApp Web and programmatically send messages. The script displays a deceptive banner labeled "WhatsApp Automation v6.0" to hide its ongoing operations activity, retrieves message templates from a command-and-control server, and exfiltrates the victim's contact list. The malware then iterates through every harvested contact, checks for pause commands, and sends personalized messages by substituting variables with time-based greetings and contact names.

Component 2: Maverick - The Banking Trojan

Maverick represents the payload component focused on financial credential theft. The malware checks active browser window URLs against a hard-coded list of 65 financial institutions in Latin America, particularly those located in Brazil. When a match is detected, Maverick invokes its Agent component to establish communication with command-and-control servers.

Geographic Targeting: Maverick is only installed after ensuring that the victim is located in Brazil by checking the time zone, language, region, and date and time format of the infected host. This precision targeting reduces detection risks and focuses resources on high-value targets.

Banking Targets: The malware specifically targets some of Brazil's largest financial institutions and payment platforms, including:

  • Banco do Brasil
  • Bradesco
  • Caixa Econômica Federal (CEF)
  • Itaú Unibanco
  • Banco do Nordeste
  • Santander
  • Sicredi
  • Mercado Pago
  • Binance (cryptocurrency exchange)

Expanding Scope: CyberProof found evidence of the malware being used to single out hotels in Brazil, indicating a possible expansion of targeting, suggesting the threat actors are diversifying beyond traditional banking targets.

Technical Deep Dive: The Infection Chain

Stage 1: Initial Compromise

The infection begins when a user downloads and extracts a malicious ZIP archive from WhatsApp. The ZIP file contains a Windows shortcut (LNK) that, when launched, runs cmd.exe or PowerShell to connect to an external server to download the first-stage payload.

The PowerShell script is designed to:

  • Launch intermediate tools to disable Microsoft Defender Antivirus and UAC
  • Retrieve a .NET loader with anti-analysis capabilities
  • Check for presence of reverse engineering tools and self-terminate if detected
Russia’s WhatsApp and VPN Restrictions: Separating Fact from Fiction
Bottom Line: The claim about Russia banning WhatsApp and VPNs starting August 1st, 2025, is false. However, Russia is indeed moving toward restricting both platforms through recent legislation and political pressure — just not on the specific date claimed. WhatsApp Disrupts Spyware Campaign Targeting Journalists and Civil Society MembersWhatsApp, the popular

Stage 2: Payload Deployment

The .NET DLL binary reaches out to an external server to fetch Maverick.StageTwo and a downloader DLL associated with hijacking WhatsApp Web that runs only on systems with an active, logged-in WhatsApp session.

Before fetching payloads, the DLL implements anti-analysis checks by scanning for debugging tools including apimonitor, blurp, fiddler, ghidra, IDA, windbg, wireshark, and x64debug.

Stage 3: Command and Control

The campaign features an innovative C2 infrastructure. SORVEPOTEL leverages IMAP connections to terra.com[.]br email accounts using hardcoded email credentials to retrieve commands rather than using traditional HTTP-based communication. Some of these accounts have been secured using multi-factor authentication to prevent unauthorized access by security researchers.

Supported Backdoor Commands

The backdoor periodically polls the C2 server for instructions, supporting 22 different commands including:

Information Gathering:

  • INFO: Collect detailed system information
  • SCREENSHOT: Take screenshots
  • TASKLIST: Enumerate running processes
  • FILE_INFO: Get detailed metadata about files
  • Keylogging: Log keystrokes to capture credentials and sensitive information
  • Application enumeration: Gather list of installed applications

System Manipulation:

  • CMD/POWERSHELL: Execute commands
  • KILL: Terminate specific processes
  • REBOOT/SHUTDOWN: System restart or shutdown with 30-second delay
  • Inject characters: Insert one or more characters into the system
  • Create overlay screens: Block keyboard and mouse interactions to prevent user control

Credential Theft:

  • Serve fake banking security alerts
  • Display phishing pages mimicking legitimate financial websites
  • Steal authentication tokens and user credentials

File Operations:

  • LIST_FILES: Enumerate files/folders
  • DOWNLOAD_FILE/UPLOAD_FILE: Transfer files
  • DELETE/RENAME/COPY/MOVE: File system manipulation
  • CREATE_FOLDER: Directory creation
  • SEARCH: Recursively search for files

Malware Management:

  • UPDATE: Download and install updated versions
  • CHECK_EMAIL: Check attacker-controlled email for new C2 URLs

The Evolution: From Coyote to Maverick

The cybersecurity community has identified significant overlaps between Maverick and an earlier banking trojan called Coyote. According to a report from CyberProof, both malware strains are written in .NET, target Brazilian users and banks, and feature identical functionality to decrypt, targeting banking URLs and monitor banking applications.

However, Kaspersky found that Maverick did contain many code overlaps with Coyote, but the Russian cybersecurity company noted it's treating it as a completely new threat targeting Brazil en masse. This suggests either an evolution of the same threat group or parallel development within Brazil's cybercriminal ecosystem.

Trend Micro said that the infection methods and ongoing tactical evolution, along with the region-focused targeting, indicate that Water Saci is likely linked to Coyote, and both campaigns operate within the same Brazilian cybercriminal ecosystem, describing the attackers as aggressive in "quantity and quality."

Real-Time Botnet Management

One of the most concerning aspects of this campaign is the level of control threat actors maintain over infected systems. The new attack chain features a sophisticated remote command-and-control system that allows threat actors real-time management, including pausing, resuming, and monitoring the malware's campaign, effectively converting infected machines into a botnet tool for coordinated, dynamic operations across multiple endpoints.

This capability allows attackers to:

  • Coordinate mass-distribution campaigns
  • Pause operations to avoid detection during security investigations
  • Resume attacks when security focus shifts elsewhere
  • Monitor infection rates and adjust tactics in real-time

The WhatsApp malware ecosystem in Brazil extends beyond Maverick. Another banking trojan called Eternidade Stealer has been spreading through WhatsApp since early 2025, specifically targeting crypto wallets and financial logins. The malware hunts for credentials from exchanges including Binance, Coinbase, and Kraken, as well as popular crypto wallets like MetaMask, Trust Wallet, and Exodus.

Sophos analysts are investigating a separate campaign tracked as STAC3150, first observed on September 24, 2025, which delivers archive attachments containing a downloader script that retrieves multiple second-stage payloads including the Astaroth banking trojan. This campaign has affected more than 250 Sophos customers, with approximately 95% of impacted devices located in Brazil.

Russian Cyber Warfare Targets Encrypted Messaging: The Signal QR Code Exploit Crisis The Rise of a New Attack Vector
Encrypted messaging apps like Signal have become critical tools for journalists, activists, military personnel, and privacy-conscious users worldwide. However, Google’s Threat Intelligence Group has revealed that Russian-aligned hacking collectives UNC5792 and UNC4221 have weaponized Signal’s device-linking feature, turning its core privacy functionality into an espionage vulnerability. WhatsApp Privacy Guide: Technical

Detection and Prevention Strategies

For Organizations

1. Endpoint Protection:

  • Deploy advanced EDR solutions capable of detecting in-memory execution
  • Monitor for PowerShell execution with Base64-encoded commands
  • Implement application whitelisting to prevent unauthorized executables

2. Network Security:

  • Monitor for unusual IMAP connections to terra.com[.]br email accounts
  • Block connections to known malicious domains (zapgrande[.]com, adoblesecuryt[.]com)
  • Implement DNS filtering to prevent C2 communications

3. Email and Messaging Policy:

  • Disable automatic downloads on WhatsApp Web for corporate devices
  • Restrict file transfers through WhatsApp and similar apps on organizational devices
  • Implement Mobile Device Management policies enforcing app store-only downloads

4. User Education:

  • Train employees to be suspicious of ZIP files received via WhatsApp, even from known contacts
  • Establish verification procedures for unexpected file transfers
  • Encourage users to log out of messaging apps when not in use

For Individuals

1. Behavioral Security:

  • Never open ZIP attachments from WhatsApp without verifying through a different channel
  • Be especially wary of messages about government programs, delivery notifications, or investment opportunities
  • Verify unexpected requests from contacts before clicking links or downloading files

2. System Hardening:

  • Keep Windows, browsers, and security software updated
  • Enable Microsoft Defender Antivirus and ensure it's not disabled
  • Install reputable endpoint security software with real-time protection

3. Session Management:

  • Regularly clear browser cookies and authentication tokens
  • Log out of WhatsApp Web when not actively using it
  • Use separate browsers for financial transactions and general browsing
Ireland’s Digital Surveillance Revolution: Government Moves to Monitor All Private Communications
Executive Summary The Irish government is preparing to grant unprecedented surveillance powers to the Gardaí (Irish police), Defence Forces, and Garda Ombudsman through the proposed Communications (Interception and Lawful Access) Bill. This legislation would fundamentally transform Ireland’s approach to digital privacy by enabling real-time monitoring of encrypted communications across all

The Broader Implications

The Water Saci campaign represents a significant evolution in banking malware distribution. Threat actors have transitioned from relying on traditional payloads to exploiting legitimate browser profiles and messaging platforms for stealthy, scalable attacks.

Several factors make this campaign particularly concerning:

1. Scale of Impact: With 148 million potential targets in Brazil alone, the attack surface is enormous. WhatsApp's position as the dominant communication platform means nearly every Brazilian with a smartphone is potentially vulnerable.

2. Trust Exploitation: The use of compromised contacts' accounts to distribute malware exploits fundamental trust relationships. Users are conditioned to trust messages from known contacts, making this vector highly effective.

3. Technical Sophistication: The multi-stage attack chain, email-based C2, browser automation, and real-time botnet management demonstrate advanced capabilities typically associated with nation-state actors.

4. Economic Motivation: Brazil's significant cryptocurrency adoption—ranking fifth globally on the Chainalysis crypto adoption index with approximately $319 billion in transactions between mid-2024 and mid-2025—makes it an attractive target for financially motivated threat actors.

Looking Forward: The Threat Landscape

The success of the Water Saci campaign is likely to inspire similar attacks in other regions with high WhatsApp adoption. Key indicators to watch include:

1. Geographic Expansion: While currently focused on Brazil, the techniques could easily be adapted for other Latin American countries or any region with high WhatsApp usage.

2. Platform Diversification: The core techniques of browser session hijacking and messaging app exploitation could be adapted for other platforms like Telegram, Signal, or regional messaging apps.

3. Increased Sophistication: The mentoring culture in Brazil's cybercriminal ecosystem means continuous knowledge transfer and capability enhancement among threat actors.

4. Commercial Malware-as-a-Service: The modular nature of SORVEPOTEL and Maverick suggests potential for commercialization, where components could be sold or rented to other threat actors.

Russian Cyber Warfare Targets Encrypted Messaging: The Signal QR Code Exploit Crisis The Rise of a New Attack Vector
Encrypted messaging apps like Signal have become critical tools for journalists, activists, military personnel, and privacy-conscious users worldwide. However, Google’s Threat Intelligence Group has revealed that Russian-aligned hacking collectives UNC5792 and UNC4221 have weaponized Signal’s device-linking feature, turning its core privacy functionality into an espionage vulnerability. WhatsApp Privacy Guide: Technical

Recommendations for Security Leaders

Immediate Actions:

  1. Audit corporate policies regarding WhatsApp Web usage
  2. Deploy detection rules for the specific TTPs used in this campaign
  3. Conduct targeted user awareness training on WhatsApp-based threats
  4. Review and strengthen endpoint security configurations

Medium-Term Initiatives:

  1. Implement Zero Trust architecture that doesn't rely on device trust alone
  2. Deploy behavioral analytics to detect session hijacking attempts
  3. Establish cross-functional incident response procedures for messaging app compromises
  4. Partner with regional CERTs and ISACs for threat intelligence sharing

Long-Term Strategy:

  1. Evaluate business necessity of allowing personal messaging apps on corporate devices
  2. Consider implementing separate mobile devices for work and personal use
  3. Invest in advanced threat hunting capabilities focused on fileless malware
  4. Develop comprehensive security awareness programs that address evolving social engineering tactics

To better understand the broader context of WhatsApp and Meta security concerns, explore these additional resources from our network:

Privacy and Security Guides

Understanding Meta's Data Practices

For compliance professionals, additional regulatory guidance on secure messaging and data protection is available at ComplianceHub.wiki, and for breach notifications and incident reports, visit Breached.company.


Conclusion

The Maverick and SORVEPOTEL malware campaign demonstrates how threat actors are increasingly exploiting trusted communication platforms to achieve mass-scale compromise. Brazil's unique position as WhatsApp's second-largest market, combined with a sophisticated domestic cybercriminal ecosystem, has created perfect conditions for this campaign to thrive.

For security professionals, this campaign serves as a stark reminder that traditional security controls may be insufficient against attacks that exploit legitimate browser profiles, trusted communication platforms, and social engineering at scale. The key to defense lies in a multi-layered approach combining technical controls, user education, and continuous threat intelligence monitoring.

As Trend Micro described the attackers as aggressive in "quantity and quality," organizations must remain vigilant and proactive in their defense strategies. The sophistication demonstrated by the Water Saci campaign suggests we're witnessing not just an isolated attack, but a fundamental shift in how financial malware is distributed and operated in the mobile-first era.


Indicators of Compromise (IoCs)

Command and Control Servers:

  • zapgrande[.]com
  • sorvetenopoate[.]com
  • adoblesecuryt[.]com
  • terra.com[.]br (IMAP-based C2)

File Indicators:

  • ZIP files following pattern: Orcamento-2025[8 random digits].zip
  • VBS files: Orcamento.vbs (SORVEPOTEL)
  • PowerShell scripts: tadeu.ps1
  • Malicious LNK shortcuts in ZIP archives
  • .NET DLL: Maverick.StageTwo
  • Maverick.Agent component
  • WinManagers.vbs in C:\ProgramData\WindowsManager\

Behavioral Indicators:

  • Unexpected Chrome process terminations followed by restarts
  • PowerShell execution with Base64-encoded commands
  • IMAP connections to terra.com[.]br
  • Mass-messaging behavior from WhatsApp Web sessions
  • Disabled Microsoft Defender Antivirus or UAC
  • Unusual browser automation using ChromeDriver and Selenium
  • Reflective DLL loading in memory
  • Code injection into powershell_ise.exe

Network Indicators:

  • Connections to Portuguese-named URLs
  • HTTPS traffic to uncommon .br domains
  • Elevated WhatsApp Web session activity
  • File downloads from external servers via PowerShell
  • Selenium WebDriver traffic patterns

References: This article synthesizes intelligence from Trend Micro, CyberProof, Kaspersky, Sophos, Google Cloud Threat Intelligence, and independent security researchers tracking the Water Saci campaign.

Read more