A new WhatsApp-propagating worm is infecting devices in Brazil, delivering a banking trojan called Eternidade (Portuguese for Eternity) Stealer that steals credentials for cryptocurrency wallets and financial services. According to the findings of Web3 security firm Trustwave SpiderLabs researchers Nathaniel Morales, John Basmayor and Nikita Kazymirskyi, the operation uses Internet Message Access Protocol to fetch […]A new WhatsApp-propagating worm is infecting devices in Brazil, delivering a banking trojan called Eternidade (Portuguese for Eternity) Stealer that steals credentials for cryptocurrency wallets and financial services. According to the findings of Web3 security firm Trustwave SpiderLabs researchers Nathaniel Morales, John Basmayor and Nikita Kazymirskyi, the operation uses Internet Message Access Protocol to fetch […]

WhatsApp worm spreads Python-based banking and crypto credential-stealing trojan in Brazil

2025/11/20 21:02
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

A new WhatsApp-propagating worm is infecting devices in Brazil, delivering a banking trojan called Eternidade (Portuguese for Eternity) Stealer that steals credentials for cryptocurrency wallets and financial services.

According to the findings of Web3 security firm Trustwave SpiderLabs researchers Nathaniel Morales, John Basmayor and Nikita Kazymirskyi, the operation uses Internet Message Access Protocol to fetch command-and-control details on demand. The stolen data can help a threat actor to rotate servers and evade disruption as the malware spreads.

“It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to update its C2 server,” the security professionals wrote in the company’s blog page on Wednesday.

Investigators said the attackers abandoned older PowerShell scripts and are now deploying a Python-based approach to hijack WhatsApp and distribute malicious files. 

Eternidade stealer hides activity through VBScript

Per Trustwave SpiderLabs’ report, the attack begins with an obfuscated VBScript whose comments are mostly written in Portuguese.

The Python worm uses shorter, more agile code to automate WhatsApp activity to extract full contact lists using wppconnect libraries, customized greetings based on the time of day, and insert recipients’ names into messages containing malicious attachments.

A central function, named “obter_contatos,” enables the malware to steal the victim’s entire WhatsApp address book. For each contact, the worm collects the phone number and name to find out if the person is saved locally and has a device that can be breached. 

The data is transmitted to an attacker-controlled server through an HTTP POST request, where after collection, a worm sends a malicious attachment to every contact using a prebuilt message template.

MSI installer deploys localized banking trojan

The second stage of the attack starts once the MSI installer drops several components, including an AutoIt script that immediately checks if the device language is set to Brazilian Portuguese. 

In cases where the system does not meet this condition, the malware shuts down, which could mean the threat actors intend to target only users in Brazil.

When the locale check passes, the script scans running processes and registry keys for signs of security tools. It also profiles the device and sends system details back to the attackers’ command-and-control server.

The attack ends with the malware injecting the Eternidade Stealer payload into “svchost.exe” using a process that hides malicious code within legitimate Windows processes, known as “hollowing.”

Eternidade Stealer continuously monitors active windows and processes for strings related to financial services, including some of Brazil’s largest banks and international fintech platforms. 

Some of the financial firms mentioned by Trustwave include Santander, Banco do Brasil, BMG, Sicredi, Bradesco, BTG Pactual, MercadoPago, Stripe, alongside crypto companies Binance, Coinbase, MetaMask, and Trust Wallet.

Brazilian banking trojans are mostly dormant until the victim opens one of the financial applications. It then triggers overlays or credential-harvesting routines while completely invisible to casual users or automated security analysis tools.

Malware geofencing limits attacks to Brazilian WhatsApp users 

Trustwave SpiderLabs also shared panel stats, which revealed that the malware restricts access to systems outside Brazil and Argentina. Out of 454 recorded communication attempts, 452 were blocked due to geofencing rules. Only two connections were allowed and redirected to the real malicious domain, and blocked attempts were rerouted to a placeholder error page.

WhatsApp worm spreads trojan targeting Brazilian crypto apps, financial credentialsOperating system distribution across observed panel data. Source: Trustwave

Of the failed connection attempts, 196 came from the United States, followed by the Netherlands, Germany, the UK, and France. Windows accounted for the largest share of attempted system connections with 115, though logs also included 94 connections on macOS, 45 on Linux, and 18 Android devices.

The discovery comes weeks after Trustwave found another operation dubbed “Water Saci” spreading through WhatsApp Web using a worm called SORVEPOTEL. That malware is a conduit for Maverick, a NET-based banking trojan that came from an earlier family known as Coyote, as Cryptopolitan reported last week.

Get $50 free to trade crypto when you sign up to Bybit now

Market Opportunity
John Tsubasa Rivals Logo
John Tsubasa Rivals Price(JOHN)
$0.00123
$0.00123$0.00123
-4.65%
USD
John Tsubasa Rivals (JOHN) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

bluesky funding disclosed: $100M Series B led

bluesky funding disclosed: $100M Series B led

The post bluesky funding disclosed: $100M Series B led appeared on BitcoinEthereumNews.com. In a move that underscores growing investor confidence in decentralized
Share
BitcoinEthereumNews2026/03/20 20:09
Italy passes law on AI outlining privacy and child access

Italy passes law on AI outlining privacy and child access

The post Italy passes law on AI outlining privacy and child access appeared on BitcoinEthereumNews.com. Italy has formally passed a sweeping new law to regulate artificial intelligence, becoming the first member of the European Union to roll out comprehensive legislation in step with the bloc’s landmark AI Act. The Italian Senate granted final approval after a year of debate, concluding what Prime Minister Giorgia Meloni’s government described as a decisive step in shaping how new technologies are deployed across the country. Italy sets tough penalties for offenders The legislation, ministers argue, lays out the boundaries for human-centric, transparent, and safe use of AI while balancing the need to foster innovation, cybersecurity, and economic growth. The law casts its net widely, and it stretches into healthcare, schools, the justice system, workplaces, sport, and the public sector. AI access for children under 14 has also been tightened, and it now requires parental consent. “This law brings innovation back within the perimeter of the public interest, steering AI toward growth, rights and full protection of citizens.” Alessio Butti, the undersecretary for digital transformation. Lawmakers also opted for a hard line on abuses. A new offence has been added to the criminal code covering the unlawful spread of AI-generated or manipulated content, such as deepfakes. Anyone found guilty faces between one and five years in prison if their actions cause harm. Using AI to commit fraud, identity theft, market manipulation, or money laundering will now be treated as an aggravating circumstance, raising potential sentences by a third. Judges remain the sole authority in legal rulings, though courts are empowered to demand rapid takedowns of illicit material. Government agencies to oversee its implementation Responsibility for enforcing the regime lies with the Agency for Digital Italy and the National Cybersecurity Agency, though existing financial watchdogs such as the Bank of Italy and Consob retain powers in their own spheres. The Department…
Share
BitcoinEthereumNews2025/09/18 06:05
Market Strategist Says the USA Just Nuked XRP. Here’s What Happened

Market Strategist Says the USA Just Nuked XRP. Here’s What Happened

Financial markets do not wait for clarity—they react instantly to tension. When global uncertainty rises, capital moves fast, and risk assets often take the first
Share
Timestabloid2026/03/20 20:05