Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New Eternidade Stealer Spreads Via WhatsApp to Steal Banking and Crypto Data

0
Medium
Published: Thu Nov 20 2025 (11/20/2025, 13:48:36 UTC)
Source: Reddit InfoSec News

Description

The Eternidade Stealer is a newly identified malware spreading via WhatsApp messages, targeting users to steal sensitive banking and cryptocurrency data. It propagates through social engineering by sending malicious links or files over WhatsApp, tricking users into executing the stealer. Once active, it harvests credentials and financial information from infected devices. Although no known exploits are reported in the wild yet, the malware poses a medium severity threat due to its potential impact on confidentiality and financial assets. European organizations with employees or customers using WhatsApp are at risk, especially those in banking and crypto sectors. Mitigation requires user awareness, endpoint protection, and network monitoring for suspicious WhatsApp traffic. Countries with high WhatsApp usage and significant financial sectors, such as the UK, Germany, France, Italy, and Spain, are more likely to be affected. The threat is assessed as medium severity given the need for user interaction and the targeted nature of the attack. Defenders should prioritize phishing education, multi-factor authentication, and rapid incident response capabilities to reduce risk.

AI-Powered Analysis

AILast updated: 11/20/2025, 13:55:48 UTC

Technical Analysis

The Eternidade Stealer is a malware strain recently reported to spread via WhatsApp messaging platforms. It leverages social engineering tactics by sending malicious links or files through WhatsApp chats, enticing users to download and execute the stealer on their devices. Once installed, the malware focuses on harvesting sensitive banking credentials and cryptocurrency wallet information, aiming to facilitate financial theft. The infection vector relies heavily on user interaction, as victims must click on links or open files received via WhatsApp. There are no specific affected software versions or patches available, and no known exploits have been documented in the wild at this time. The malware's propagation through a widely used communication platform like WhatsApp increases its potential reach, especially among users who may not expect threats via this channel. The technical details are limited, but the medium severity rating reflects the balance between the potential financial impact and the requirement for user action to trigger infection. The threat was identified through a Reddit InfoSec news post linking to an external source, indicating early-stage awareness but limited discussion or detailed technical analysis so far.

Potential Impact

For European organizations, the Eternidade Stealer poses a significant risk to the confidentiality of banking and cryptocurrency credentials, potentially leading to direct financial losses and reputational damage. Organizations with employees who use WhatsApp for communication are vulnerable to targeted phishing campaigns that could compromise corporate or personal financial accounts. The malware could also affect customers of European financial institutions if their devices are infected, undermining trust and increasing fraud incidents. The impact extends to cryptocurrency exchanges and wallet providers, where stolen credentials could facilitate unauthorized transactions. Given the widespread use of WhatsApp across Europe, the threat could propagate quickly if not mitigated. Additionally, the theft of sensitive financial data could lead to regulatory scrutiny under GDPR and financial compliance frameworks, increasing legal and financial liabilities for affected organizations.

Mitigation Recommendations

To mitigate the threat posed by the Eternidade Stealer, European organizations should implement targeted user awareness training focused on the risks of clicking links or opening files received via WhatsApp, emphasizing skepticism towards unsolicited messages even from known contacts. Deploy advanced endpoint protection solutions capable of detecting and blocking malware execution and credential-stealing behaviors. Network monitoring should include analysis of WhatsApp traffic patterns to identify anomalies or suspicious activity. Enforce multi-factor authentication (MFA) on all banking and cryptocurrency-related accounts to reduce the risk of unauthorized access even if credentials are compromised. Regularly update and patch all systems, although no specific patches exist for this malware, to reduce the attack surface for other potential threats. Encourage the use of dedicated devices or secure environments for cryptocurrency management to isolate sensitive operations. Establish rapid incident response procedures to quickly contain and remediate infections. Finally, collaborate with local cybersecurity authorities to share threat intelligence and stay updated on emerging variants or attack campaigns.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
InfoSecNews
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
hackread.com
Newsworthiness Assessment
{"score":27.1,"reasons":["external_link","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":[],"foundNonNewsworthy":[]}
Has External Source
true
Trusted Domain
false

Threat ID: 691f1dd53e6177767e7f4ade

Added to database: 11/20/2025, 1:55:33 PM

Last enriched: 11/20/2025, 1:55:48 PM

Last updated: 11/21/2025, 3:18:53 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats