Brazilian cryptocurrency users face a serious new threat as cybercriminals deploy sophisticated malware through WhatsApp messages.Brazilian cryptocurrency users face a serious new threat as cybercriminals deploy sophisticated malware through WhatsApp messages.

WhatsApp Worm Spreads Banking Trojan Across Brazil, Targets Crypto Wallets

The campaign uses a banking trojan called Eternidade Stealer that specifically targets crypto wallets and financial logins across Latin America’s largest digital asset market.

How the Attack Works

The malware spreads through WhatsApp using two main components: a self-replicating worm and a banking trojan. When victims click a malicious link sent via WhatsApp, they trigger an automated sequence that hijacks their account and downloads harmful software in the background.

Trustwave SpiderLabs researchers identified this campaign in November 2025. The researchers noted that threat actors use fake government programs, delivery notifications, and fraudulent investment groups to trick people into clicking malicious links.

The worm component hijacks WhatsApp accounts and accesses contact lists. It uses smart filtering to ignore business contacts and groups, focusing instead on individual people who are more likely to fall for the scam. The malware then automatically sends personalized messages to each contact, using their real names and time-appropriate greetings in Portuguese.

Source: trustwave.com

Meanwhile, the banking trojan quietly installs itself on the victim’s device. This Eternidade Stealer scans for financial applications and crypto wallets running on the computer. When it detects banking apps or crypto exchanges, the malware immediately activates and begins stealing login credentials.

Targeted Financial Services and Crypto Platforms

The malware targets a wide range of Brazilian financial institutions including major banks like Bradesco, BTG Pactual, Itaú, Santander, and Caixa Econômica Federal. Payment services such as MercadoPago and Stripe are also on the target list.

For cryptocurrency users, the threat is particularly severe. The malware hunts for credentials from exchanges including Binance, Coinbase, Kraken, and numerous others. It also targets popular crypto wallets like MetaMask, Trust Wallet, Exodus, Ledger Live, and Phantom Wallet among many others.

Brazil represents an attractive target for cybercriminals because of its significant crypto adoption. The country ranks fifth globally on the Chainalysis crypto adoption index and processed approximately $319 billion in crypto transactions between mid-2024 and mid-2025.

Advanced Evasion Techniques

What makes Eternidade Stealer particularly dangerous is its clever approach to avoiding detection. Unlike typical malware that connects to fixed server addresses, this trojan uses email accounts to receive instructions from hackers.

The malware contains hardcoded login credentials for Gmail accounts. It connects to these accounts using standard email protocols (IMAP) to check for new commands. This method blends in with normal email traffic, making it harder for security systems to detect and block.

If authorities shut down one command server, the attackers simply send a new email with updated server addresses. The malware checks the email, extracts the new server location, and continues operating. This email-based system helps the malware maintain persistence and evade network-level shutdowns.

The trojan also only activates on computers using Brazilian Portuguese as the system language. If it detects any other language, the malware immediately terminates itself. This hyper-focused targeting helps the attackers avoid security researchers and focus resources on their intended victims.

Security researchers have tracked multiple related campaigns targeting Brazilian users through WhatsApp. In September 2025, Trend Micro identified a campaign called Water Saci that spread malware named SORVEPOTEL. This campaign infected government organizations, manufacturing companies, and educational institutions across Brazil.

Another banking trojan called Maverick has also been spreading through WhatsApp since early 2025. These campaigns share similar techniques, including WhatsApp hijacking and targeting Brazilian financial institutions.

The Eternidade Stealer campaign represents an evolution of these earlier threats. The attackers shifted from PowerShell scripts to Python programming, making their worm more efficient at spreading through WhatsApp contacts. They also added the innovative email-based command system that makes the malware harder to shut down.

Security logs from the threat actors’ own infrastructure revealed surprising global reach. While the malware targets Brazil specifically, connection attempts came from 38 different countries. The United States showed the highest number of connections with 196 attempts, followed by the Netherlands, Germany, and the United Kingdom.

Protection Steps for Users and Organizations

WhatsApp users should exercise extreme caution with any links received through the app, even from trusted contacts. If someone sends an unexpected link with limited context, verify it through a different communication channel before clicking.

Security experts recommend several protective measures. Keep all software and operating systems updated to patch vulnerabilities that malware might exploit. Install reputable antivirus software that can detect and block malicious files. Be especially suspicious of messages about government programs, delivery notifications, or investment opportunities that arrive unexpectedly.

If someone suspects their account has been compromised, immediate action is critical. Freeze access to all banking and cryptocurrency accounts right away. Contact financial institutions and exchanges to report the breach. Monitor all transactions closely, as this can help authorities track stolen funds and potentially freeze hacker wallets.

Organizations face additional responsibilities in protecting their networks. IT administrators should configure corporate devices to disable automatic downloads of media and documents on WhatsApp. Use endpoint security and firewall policies to restrict file transfers through personal messaging apps on work computers.

The growing threat of crypto wallet attacks extends beyond Brazil. Similar malware campaigns have targeted users worldwide, with attackers constantly developing new techniques to steal digital assets. Hardware wallets that require physical confirmation of transactions remain the most secure option for storing cryptocurrency.

Brazil’s evolving crypto landscape makes it an increasingly attractive target. The country is considering adding Bitcoin to national reserves and implementing comprehensive stablecoin regulations, developments that signal growing mainstream adoption. This increased activity naturally draws more attention from cybercriminals seeking to exploit users.

The Digital Arms Race Continues

The Eternidade Stealer campaign demonstrates how cybercriminals rapidly adapt their tactics to exploit popular platforms like WhatsApp. Their use of email-based command systems and hyper-targeted geographic filtering shows sophisticated operational security. As Brazil’s crypto market continues growing, users must remain vigilant against evolving social engineering attacks that leverage trust in everyday communication tools. The best defense combines healthy skepticism toward unexpected messages, robust security software, and immediate response protocols when compromise occurs.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
SUI Price Eyes Breakout, Targets $11 Says Analyst

SUI Price Eyes Breakout, Targets $11 Says Analyst

The post SUI Price Eyes Breakout, Targets $11 Says Analyst appeared on BitcoinEthereumNews.com. SUI price shows a technical setup for a macro breakout with analyst Dan Gambardello targeting $10-$11 levels. Recent partnership with Google’s Agentic Payments Protocol adds fundamental support to the technical analysis as SUI moves closer to potential breakout levels. SUI Price Analysis Points to $10-$11 Breakout Target Dan Gambardello has identified a clear ascending triangle formation on SUI price daily chart with upside targets around $10.79. The analyst simplified this target range to $10-$11 for practical trading purposes. The pattern shows sustained higher lows meeting resistance at current levels before a potential breakout. VanEck maintains more aggressive SUI crypto targets ranging from $13-$25 according to Gambardello’s research. SUI Price Analysis | Source: Dan Gambardello, X The $10 level is a more conservative higher high area for the current cycle. Midterm targets point to $7.50 in the 1.618 Fibonacci extension zone before longer-term objectives. The monthly RSI shows extreme compression that Gambardello describes as “screaming for a macro breakout to the upside.” This momentum oscillator behavior typically precedes major price movements in the crypto market. SUI crypto risk model currently sits at 51 and matches pre-bull market levels seen in coins like Ethereum. Gambardello compared this to Ethereum’s December 2020 reading of 51 before its major breakout. The March 2017 Ethereum reading of 53 preceded that cycle’s parabolic move. The analyst also noted that SUI price trades near the same levels from almost a year ago in November 2024. Bollinger Bands Signal Historic Compression CryptoBullet has identified the tightest Bollinger Bands in SUI’s entire trading history on the weekly chart. The BBW indicator compression reached levels that were historically followed by major price movements. This setup mirrors conditions before SUI’s previous major rallies. Historical data shows SUI price delivered +253% gains between December 2023 and March 2024 following similar compression. SUI…
Share
BitcoinEthereumNews2025/09/18 11:32
How Zero Knowledge Proof Is Changing Blockchain Performance Forever

How Zero Knowledge Proof Is Changing Blockchain Performance Forever

The post How Zero Knowledge Proof Is Changing Blockchain Performance Forever appeared on BitcoinEthereumNews.com. Crypto Projects Learn how Zero Knowledge Proof
Share
BitcoinEthereumNews2026/01/13 04:11