Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Eternidade Stealer: WhatsApp Hijacking for Banking Fraud

0
Medium
Published: Thu Nov 20 2025 (11/20/2025, 12:05:07 UTC)
Source: Reddit InfoSec News

Description

Eternidade Stealer is a banking Trojan distributed via WhatsApp hijacking and social engineering. It uses a Python-based WhatsApp worm to propagate malicious attachments and an MSI installer that deploys a Delphi-based banking Trojan. The campaign aims to steal banking credentials and conduct fraud. Exploitation does not require prior authentication but relies on user interaction to open malicious attachments. The malware targets Windows systems through MSI installers. The medium severity rating reflects moderate impact and exploitation complexity. European organizations with significant WhatsApp usage and Windows environments are at risk, especially financial institutions. Mitigations include user awareness training, restricting MSI execution, and monitoring WhatsApp traffic for suspicious activity. Countries with high WhatsApp penetration and financial sector importance, such as Germany, France, Italy, Spain, and the UK, are most likely affected. The threat poses a medium risk due to its reliance on social engineering and targeted banking fraud objectives.

AI-Powered Analysis

AILast updated: 11/20/2025, 12:08:21 UTC

Technical Analysis

Eternidade Stealer is a recently identified banking Trojan campaign discovered by Trustwave SpiderLabs researchers. The malware is distributed through a novel propagation method involving WhatsApp hijacking, where a Python-written WhatsApp worm spreads malicious attachments to contacts of infected users. Upon execution, the delivered MSI installer deploys a Delphi-based banking Trojan designed to steal banking credentials and facilitate fraudulent transactions. The campaign leverages social engineering lures to convince victims to open the malicious attachments, which is critical for infection. The Trojan targets Windows operating systems, exploiting the MSI installer format to execute its payload. Although no known exploits are reported in the wild, the campaign's use of a worm component to self-propagate via WhatsApp is notable for its potential rapid spread within social networks. The medium severity rating assigned reflects the threat's potential to compromise confidentiality and integrity of banking information, moderate ease of exploitation requiring user interaction, and the limited scope to Windows users who engage with the malicious content. The campaign's reliance on WhatsApp, a widely used messaging platform, increases its reach and potential impact, especially in regions with high WhatsApp adoption. The Delphi-based Trojan likely includes capabilities for credential theft, keylogging, or web injection to facilitate banking fraud. The campaign's social engineering aspect and propagation method represent a sophisticated approach to malware distribution targeting financial data theft.

Potential Impact

For European organizations, the Eternidade Stealer campaign poses a significant threat to financial institutions and any entities with employees or customers using WhatsApp on Windows devices. The Trojan's ability to steal banking credentials can lead to direct financial losses, unauthorized transactions, and reputational damage. The worm-like propagation through WhatsApp contacts increases the risk of rapid internal spread within organizations or across personal networks, potentially compromising multiple users. The reliance on social engineering means that user awareness is a critical factor; however, successful infections can lead to data breaches affecting confidentiality and integrity of sensitive financial information. The campaign could disrupt banking operations and increase fraud-related costs. Additionally, organizations may face regulatory consequences under GDPR if customer financial data is compromised. The threat is particularly impactful in sectors with high dependence on digital banking and remote communications, which are prevalent across Europe.

Mitigation Recommendations

To mitigate the risk posed by Eternidade Stealer, European organizations should implement targeted measures beyond generic advice: 1) Conduct focused user awareness training emphasizing the risks of opening unsolicited attachments received via WhatsApp or other messaging platforms, highlighting the specific threat of social engineering via trusted contacts. 2) Enforce application whitelisting policies to restrict execution of MSI installers from untrusted sources, reducing the risk of Trojan deployment. 3) Deploy endpoint detection and response (EDR) solutions capable of identifying suspicious MSI execution and Delphi-based malware behaviors. 4) Monitor network traffic for unusual WhatsApp activity or mass messaging patterns indicative of worm propagation. 5) Encourage the use of multi-factor authentication (MFA) for banking and critical systems to limit the impact of credential theft. 6) Collaborate with internal IT and security teams to establish rapid incident response protocols for suspected infections. 7) Regularly update and patch Windows systems and security software to reduce exploitation vectors. 8) Consider restricting or monitoring the use of personal messaging apps on corporate devices where feasible. These measures collectively reduce the likelihood of infection and limit the damage caused by successful compromises.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
cyberdigests.com
Newsworthiness Assessment
{"score":36.1,"reasons":["external_link","newsworthy_keywords:trojan,banking trojan,campaign","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["trojan","banking trojan","campaign"],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 691f04a4d820e5151fbc3c0b

Added to database: 11/20/2025, 12:08:04 PM

Last enriched: 11/20/2025, 12:08:21 PM

Last updated: 11/21/2025, 7:14:19 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats