📰 Full Story
Two separate but related security incidents this week have highlighted growing abuse of WhatsApp as a malware delivery vector.
On April 1–2, 2026, WhatsApp told roughly 200 users — primarily in Italy — they had installed a counterfeit iPhone client that was actually government-grade spyware attributed to Italian surveillance firm SIO (through its ASIGINT unit). The malware, linked to a family researchers call “Spyrtacus,” can exfiltrate messages, call logs and record audio/video; WhatsApp has logged affected accounts out, urged users to reinstall the official app and said it will issue a formal legal demand to SIO. Separately, Microsoft on March 31 flagged a broad campaign that has been delivering malicious Visual Basic Script (VBS) files via WhatsApp since late February to compromise Windows machines.
That chain uses social engineering, “living‑off‑the‑land” techniques (renamed legitimate Windows utilities), trusted cloud hosting (AWS, Tencent Cloud, Backblaze) and unsigned MSI installers to gain persistence and attempt UAC elevation.
Both operations rely on user deception rather than zero‑day exploits, complicating automated defenses and increasing the reliance on user vigilance and endpoint controls.






💬 Commentary