SEK Identifies WhatsApp Scam Campaign with Fake Payment Receipt

SEK has identified a new cyberattack campaign targeting Brazilian companies through WhatsApp.
Criminals are using seemingly legitimate phone numbers to distribute malicious files disguised as payment receipts,
compromising the security of organizations across various sectors in the country.

The attackers’ strategy is sophisticated and leverages the trust established through WhatsApp communication.
The approach begins with a cordial greeting, followed by the name or number of the recipient, creating an appearance of legitimacy. Then, the criminals send a compressed ZIP file, accompanied by a message stating:
“Viewing allowed only on computers. If you are using the Chrome browser, you may be asked to ‘Keep’ the file…”.
This instruction was specifically crafted to trigger the victim’s curiosity and encourage them to download and open the malicious file.

Technical analysis conducted by SEK revealed that the compressed file contains a shortcut that, in reality, is an obfuscated command line. When executed, this shortcut makes a request to malicious domains controlled by the attackers, including: zapgrande[.]com, sorvetenopote[.]com, expansiveuser[.]com, and etenopote[.]com,
as well as the IP addresses 23[.]227[.]203[.]148 and 109[.]176[.]30[.]141.
These requests download the malicious payload, establish persistence on the compromised system, and configure a command-and-control channel using the Havoc framework.

Havoc is an open-source remote access tool that has gained popularity among cybercriminals for its versatility and ability to evade security systems. Once command and control are established, attackers can capture credentials, steal confidential information, monitor user activities, and use the compromised system as an entry point for more complex attacks against corporate infrastructure.

The use of legitimate WhatsApp numbers makes this campaign particularly dangerous, as victims may recognize the number and believe the message comes from a trusted source. In addition, the context of payment receipts is especially effective in the Brazilian corporate environment. SEK has further analyzed similar campaigns in our Intelligence Bulletin:

https://links.sek.io/bdi-golpeboletofalso2

SEK has already added the domains and IP addresses identified in this campaign to detection and blocking mechanisms in the environments of managed clients.

Recommendations:

  • Establish continuous cybersecurity awareness programs, training employees to recognize social engineering attempts.
  • Implement strict verification policies for any file received via instant messaging before opening them on corporate devices.
  • Deploy robust and updated antimalware solutions on all endpoints.
  • Maintain 24/7 monitoring to detect anomalous behavior, with specialized incident response capabilities.
  • Adopt Threat Intelligence solutions to keep the team informed about active campaigns and relevant IoCs.

SEK remains available to clarify doubts, implement protective measures, and respond to any incidents related to this campaign.

 

More content like this:

Critical Vulnerability in Fortra GoAnywhere MFT Exploited by Attackers

Fortra GoAnywhere MFT tool, widely used for file transfers, has been under active exploitation since September 10, 2025

Extraordinary VN – VMware Aria Operations e VMware Tools

Broadcom disclosed CVE-2025-41244 (CVSS 7.8) in VMware Aria/Tools, a zero-day exploited by Chinese actors.

Privacy Overview
SEK

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Additional Cookies

This website uses the following additional cookies:

(List the cookies that you are using on the website here.)