Tuesday, January 14, 2025
HomeMobile AttacksCritical Update - Whatsapp malware targets Indian Android Users -Attacking vectors PDF,...

Critical Update – Whatsapp malware targets Indian Android Users -Attacking vectors PDF, DOC, XLS

Published on

Whatsapp malware targets Indian Android Users, a warning issued by Central security services.

This malware spreads through true looking word records sent by means of WhatsApp, which could then take delicate data from clients, including internet banking credentials and other Sensitive data.

Identified malicious WhatsApp messages

Hackers are taking advantage of two major associations in the district to trick clients to tap on the message attachment.

So for identified malicious WhatsApp messages contain names of major organizations in India

  1. NDA (National Defense Academy) “NDA-ranked-8th-toughest-College-in-the-world-to-get-into.xls”

  2. NIA (National Investigation Agency) “NIA-selection-order-.xls”

Behaviour and targeted Audience

Once downloaded, the corrupt files hack into the phone’s system and steal the user’s personal information, passwords, login accounts and banking data.

The malware is most formatted as an Excel document, but officials said it could also appear in Word or Pdf formats.

The primary focus of the malware has been the Indian defense, paramilitary and police forces.

“As these two organizations are very popular and known within the country and abroad and there is a curiosity about them, it is possible that it may affect the mobile phones of people interested in these subjects,” officials told the Economic Times.

Whatsapp has not commented about malware or security measures to prevent circulation.It’s unclear at this time what else this virus does on a phone or tablet.

Preventive Method

As usual, the ideal approach to make sure your information is to avoid from tapping on questionable connections, regardless of how you get them, and limit app use to applications downloaded from authority application stores.

If you accidentally clicked on the Malware disable the Internet Connection immediately.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical macOS Vulnerability Lets Hackers to Bypass Apple’s System Integrity Protection

Microsoft Threat Intelligence has uncovered a critical macOS vulnerability that allowed attackers to bypass...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

Microsoft Warns of MFA Issue Affecting Microsoft 365 users

Microsoft has issued a warning regarding an ongoing issue with Multi-Factor Authentication (MFA) that...

RedCurl APT Deploys Malware via Windows Scheduled Tasks Exploitation

Researchers identified RedCurl APT group activity in Canada in late 2024, where the attackers...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to...

Ghost Tap Attack, Hackers Stolen Credit Card Linked To Google Pay Or Apple Pay

Threat actors are exploiting a new cash-out tactic called "Ghost Tap" to siphon funds...

HookBot Malware Use Overlay Attacks Impersonate As Popular Brands To Steal Data

The HookBot malware family employs overlay attacks to trick users into revealing sensitive information...