Maverick Malware - WhatsApp Web Hijack Targets Brazil’s Banks
Category:Threat Actors & Campaigns
Maverick, a .NET banking malware linked to the Water Saci cluster, hijacks WhatsApp Web sessions to self-propagate and steal banking credentials from Brazilian users, mapped to T1105 (Ingress Tool Transfer), T1059 (Command & Scripting), and T1114 (Email Collection via IMAP C2). The attack chain drops a ZIP containing a Windows LNK that launches PowerShell, downloads a loader, and deploys two components: SORVEPOTEL for propagation and Maverick for credential theft and browser monitoring. Targets include Brazil’s largest banks and hospitality sector. Propagation abuses Chrome profiles and Selenium/ChromeDriver to automate WhatsApp Web, exfiltrate contact lists, and message templates. The malware checks locale/time-zone to ensure Brazilian targeting, disables Microsoft Defender and UAC, and only delivers Maverick after environmental checks. Analysts note overlaps with the Coyote family, though treatment as a distinct threat continues. Impact: With 148M+ WhatsApp users in Brazil, organizations face account takeover, large-scale credential theft, financial fraud, and reputational damage. Maverick’s C2 employs email-based control (terra.com[.]br via IMAP with MFA) alongside HTTP endpoints, allowing human-in-the-loop orchestration to pause/resume campaigns and tailor lures. Mitigation: enforce application control and PowerShell Constrained Language Mode, monitor for ChromeDriver/Selenium downloads, block suspicious LNK execution from archives, and detect WhatsApp Web automation patterns. Educate users on ZIP/LNK risks and monitor banking URL matches in active tab telemetry.
CORTEX Protocol Intelligence Assessment
Business Impact: High risk of credential theft and fraud for Brazilian subsidiaries and consumers; potential brand damage from compromised WhatsApp accounts spreading malware to customers. Technical Context: LNK → PowerShell loader → SORVEPOTEL propagation via WhatsApp Web; IMAP-based C2 with MFA. ATT&CK: T1105, T1059, T1114, plus defense evasion via disabling AV/UAC.
Strategic Intelligence Guidance
- Block execution of LNK from archives and enforce AMSI/CLM for PowerShell across endpoints.
- Detect ChromeDriver/Selenium installs outside developer groups; monitor WhatsApp Web automation.
- Implement bank session protection: anti-overlay, URL monitoring, and conditional access for Brazil.
- Harden browsers with policy: disallow external extensions and enforce real-time safe browsing.
Vendors
Threats
Targets
Intelligence Source: Maverick Malware - WhatsApp Web Hijack Targets Brazil’s Banks | Nov 12, 2025