Friday, January 31, 2025
HomeMobile AttacksCritical Update - Whatsapp malware targets Indian Android Users -Attacking vectors PDF,...

Critical Update – Whatsapp malware targets Indian Android Users -Attacking vectors PDF, DOC, XLS

Published on

SIEM as a Service

Follow Us on Google News

Whatsapp malware targets Indian Android Users, a warning issued by Central security services.

This malware spreads through true looking word records sent by means of WhatsApp, which could then take delicate data from clients, including internet banking credentials and other Sensitive data.

Identified malicious WhatsApp messages

Hackers are taking advantage of two major associations in the district to trick clients to tap on the message attachment.

So for identified malicious WhatsApp messages contain names of major organizations in India

  1. NDA (National Defense Academy) “NDA-ranked-8th-toughest-College-in-the-world-to-get-into.xls”

  2. NIA (National Investigation Agency) “NIA-selection-order-.xls”

Behaviour and targeted Audience

Once downloaded, the corrupt files hack into the phone’s system and steal the user’s personal information, passwords, login accounts and banking data.

The malware is most formatted as an Excel document, but officials said it could also appear in Word or Pdf formats.

The primary focus of the malware has been the Indian defense, paramilitary and police forces.

“As these two organizations are very popular and known within the country and abroad and there is a curiosity about them, it is possible that it may affect the mobile phones of people interested in these subjects,” officials told the Economic Times.

Whatsapp has not commented about malware or security measures to prevent circulation.It’s unclear at this time what else this virus does on a phone or tablet.

Preventive Method

As usual, the ideal approach to make sure your information is to avoid from tapping on questionable connections, regardless of how you get them, and limit app use to applications downloaded from authority application stores.

If you accidentally clicked on the Malware disable the Internet Connection immediately.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds...

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information...