Technology
WhatsApp Web malware spreads banking trojan automatically
NEWYou can now listen to Fox News articles!
A new malware campaign is turning WhatsApp Web into a weapon. Security researchers say a banking Trojan linked to Astaroth is now spreading automatically through chat messages, making the attack harder to stop once it starts.
The campaign is known as Boto Cor-de-Rosa. It shows how cybercriminals keep evolving, especially when they can abuse tools people trust every day. This attack focuses on Windows users and uses WhatsApp Web as both the delivery system and the engine that spreads the infection further.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK
Attackers abuse WhatsApp Web to spread malware through messages that appear to come from people you trust. (Kurt “CyberGuy” Knutsson)
How this WhatsApp Web attack works
The attack starts with a simple message. A contact sends what looks like a routine ZIP file through WhatsApp. The file name appears random and harmless, which lowers suspicion. Once opened, the ZIP contains a Visual Basic script disguised as a normal document. If the user runs it, the script quietly pulls in two more pieces of malware. Then the script downloads the Astaroth banking malware written in Delphi. It also installs a Python-based module designed to control WhatsApp Web. Both components run in the background without obvious warning signs. From there, the infection becomes self-sustaining.
Malware that spreads itself through your contacts
What makes this campaign especially dangerous is how it propagates. The Python module scans the victim’s WhatsApp contacts and sends the malicious ZIP file to every conversation automatically. Researchers at Acronis found that the malware adapts its messages based on the time of day. It sends friendly greetings, making the message feel normal and familiar. The text reads, “Here is the requested file. If you have any questions, I’m available!” Because the message appears to come from someone you know, many people open it without hesitation.
NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY
A single ZIP file sent through chat can quietly install banking malware and begin spreading to every contact. (Kurt “CyberGuy” Knutsson)
Built-in tracking keeps the attack efficient
This malware is carefully designed to monitor its own performance in real time. The propagation tool tracks how many messages are successfully delivered, how many fail to send, and the overall sending speed measured per minute. After every 50 messages, it generates progress updates that show how many contacts have been reached. This feedback allows attackers to measure success quickly and make adjustments if something stops working.
What happens after infection
The initial script is heavily obfuscated to avoid detection by antivirus tools. Once it runs, it launches PowerShell commands that download more malware from compromised websites. One known domain used in this campaign is coffe-estilo.com. The malware installs itself inside a folder that mimics a Microsoft Edge cache directory. Inside are executable files and libraries that make up the full Astaroth banking payload. From there, the malware can steal credentials, monitor activity and potentially access financial accounts.
Why WhatsApp Web is being abused
WhatsApp Web is popular because it mirrors your phone conversations on a computer. That convenience makes it easy to send messages, share files and type faster, but it also introduces risk. When you use WhatsApp Web, you link your phone to a browser by scanning a QR code at web.whatsapp.com. Once connected, that browser session becomes a trusted extension of your account. Your chats appear on the screen, messages you send come from your real number and incoming messages sync across both devices.
That setup is exactly what attackers take advantage of. If malware gains access to a computer with WhatsApp Web logged in, it can act as the user. It can read messages, access contact lists and send files or links that look completely legitimate. The messages do not raise alarms because they are coming from a real account, not a fake one.
This is what turns WhatsApp Web into an effective delivery system for malware. Instead of breaking into WhatsApp itself, attackers simply abuse an open browser session to spread malicious files automatically. Many users do not realize the danger because WhatsApp Web feels harmless. It is often left signed in on work computers, shared devices or systems without strong security. In those situations, malware does not need advanced tricks. It only needs access to an already trusted session. That combination of convenience and trust is why WhatsApp Web has become such an attractive target.
MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS
Once WhatsApp Web is compromised, malware can act like the user, sending messages and files that look completely legitimate. (Kurt “CyberGuy” Knutsson)
How to stay safe from WhatsApp Web malware
Attacks like this WhatsApp Web malware are designed to spread fast through trusted conversations. A few smart habits can dramatically lower your risk.
1) Be skeptical of unexpected attachments
Messaging apps feel casual, which is exactly why attackers use them. Never open ZIP files sent through chat unless you confirm with the sender first. Watch for file names made of random numbers or unfamiliar names. Treat messages that create urgency or feel overly familiar as a warning sign. If a file arrives out of nowhere, pause before clicking.
2) Lock down WhatsApp Web access
This campaign abuses WhatsApp Web to spread automatically once a device is infected. Check active WhatsApp Web sessions and log out of any you do not recognize. Avoid leaving WhatsApp Web signed in on shared or public computers. Enable two-factor authentication (2FA) inside WhatsApp settings. Cutting off Web access helps limit how far malware can travel.
3) Keep your Windows PC locked down and use strong antivirus software
This type of malware takes advantage of systems that fall behind on updates. Install Windows updates as soon as they are available. Also, keep your web browser fully updated. Staying current closes many of the doors attackers try to slip through. In addition, use strong antivirus software that watches for script abuse and PowerShell activity in real time.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
4) Limit how much of your personal data is online
Banking malware often pairs with identity theft and financial fraud. One way to reduce the fallout is by shrinking your digital footprint. A data removal service can help remove your personal information from data broker sites that attackers often search. With less information available, criminals have fewer details to exploit if malware reaches your device.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
5) Add identity theft protection for extra coverage
Even with strong security habits, financial monitoring adds another layer of protection. An identity theft protection service can watch for suspicious activity tied to your credit and personal data. Identity theft companies can monitor personal information like your Social Security number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
You should also turn on alerts for bank and credit card transactions so you are notified quickly if something looks wrong. The less exposed your data is, the fewer opportunities attackers have to cause damage.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
6) Slow down and trust your instincts
Most malware infections happen because people act too quickly. If a message feels off, trust that instinct. Familiar names and friendly language can lower your guard, but they should never replace caution. Take a moment to verify the message or file before opening anything. Attackers rely on trust and urgency to succeed. Slowing down takes away their advantage.
Kurt’s key takeaways
This WhatsApp Web malware campaign is a reminder that cyberattacks no longer rely on obvious red flags. Instead, they blend into everyday conversations and use familiar tools to spread quietly and quickly. What makes this threat especially concerning is how little effort it takes for it to move from one device to dozens of others. A single click can turn a trusted chat into a delivery system for banking malware and identity theft. The good news is that small changes make a big difference. Paying attention to attachments, locking down WhatsApp Web access, keeping devices updated and slowing down before clicking can stop these attacks cold. As messaging platforms continue to play a bigger role in daily life, staying alert is no longer optional. Awareness and simple habits remain some of the strongest defenses you have.
Do you think messaging apps are doing enough to protect users from malware that spreads through trusted conversations? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Iranian women Trump ‘saved’ from execution are simultaneously real and AI-manipulated
Only the night before, he had posted on Truth Social about the imminent executions of these women, quoting a screenshot that included a collage of eight glamorously backlit, soft-focus portraits. The photos of the women were immediately accused of being AI-generated. “Trump is begging Iranian leaders to not execute 8 AI-generated women. This is the funniest thing I’ve ever seen,” said one viral X post.
On top of that, almost immediately after Trump’s announcement, Mizan, an Iranian state news agency, called the president a liar. “Last night, Donald Trump, citing a completely false news story, called on Iran to overturn the death sentences of eight women.” Mizan said that some of the women had already been released and others were facing prison time but not execution, and furthermore said that Tehran had made no concessions — presumably, the status of the women has not changed.
The X account for the Iranian embassy in South Africa, perhaps the most relentless shitposter among Iran’s state-affiliated accounts, was quick to pile on by generating its own set of eight women:
The collage that Trump posted is, at the very least, AI-modified, Mahsa Alimardani, the associate director of the Technology Threats & Opportunities program at WITNESS, told The Verge. But the women themselves are real. The woman in the top right corner of the collage is Bita Hemmati, whose photograph appeared in several news stories in various right-leaning news outlets last week. Hemmati is confirmed to have received a death sentence issued by Branch 26 of the Tehran Revolutionary Court for “operational action for the hostile government of the United States and hostile groups.”
Alimardani named six of the women (Bita Hemmati, Mahboubeh Shabani, Venus Hossein-Nejad, Golnaz Naraghi, Diana Taherabadi, Ghazal Ghalandri), and said that the identities of the final two (said to be Panah Movahedi and Ensieh Nejati) were still unverified. The six verified women participated in protests against the government in January. Aside from Hemmati, none of the other women are reported to have received death sentences.
It’s not surprising that Trump has a careless disregard for the truth; it’s not surprising, either, for the Iranian regime to fudge the details to suit its own narrative, or to make light of real political prisoners in order to dunk on the United States.
The additional wrinkle is that the account mocking Trump for coming to the rescue of “8 AI-generated women” is the very same one that landed South Korean president Lee Jae-myung in hot water when he quoted a misleading labeled video posted by that account. Israeli officials have accused the account of being “well-known for spreading disinformation.” The case of the sketchy Lee Jae-myung quote-post is a story of mingled truth and misinformation, where the post got facts very wrong, but the video — of Israeli Defense Forces soldiers shoving a limp body off a rooftop in Gaza — was real, documenting an event that possibly implicates Israeli forces in a violation of international law.
The case of the eight Iranian protesters also features that same mingling of fact and fiction into a fuzzy distortion that fuels an endless disputation of real human rights violations. Their lives have been reduced to glossy pixels and quote-dunks, the stuff of propaganda and parody. While known liars fight with each other on the internet about who these women are and what will happen to them, they — verifiably six of them, at least — remain real people who exist beyond the Iranian internet blackout.
Technology
Booking.com data breach exposes traveler data to scams
NEWYou can now listen to Fox News articles!
You probably didn’t expect a travel booking platform to send you into a security spiral. Yet here we are.
Booking.com confirmed that hackers may have accessed customer data, including names, email addresses, phone numbers and booking details. That is enough information to make scam messages look real.
If you’ve booked a hotel or rental through the platform, this is worth your attention.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
SMART TRAVEL SAFETY TIPS BEFORE YOUR NEXT TRIP
Booking.com says hackers may have accessed customer names, emails, phone numbers and reservation details. The breach could make phishing messages look far more convincing. (KairosDee/Getty Images)
What happened in the Booking.com data breach
The company sent email notifications to affected customers after detecting “suspicious activity involving unauthorized third parties” accessing guest booking information. That’s the corporate way of saying someone got in who shouldn’t have been there.
One user shared the full notification on Reddit, where dozens of others said they received the same message. That suggests this was not an isolated case. The notice warned that anything customers “may have shared with the accommodation” could also have been exposed, meaning the breach went beyond basic account data.
What data was exposed in the Booking.com breach
Booking.com confirmed that financial information was not accessed. Physical home addresses were also not part of the breach, according to the company. So no, someone doesn’t have your credit card number or home address from this incident.
What they do potentially have: your name, email address, phone number and the details of your reservation. That’s enough to craft a convincing phishing message, which some hackers may already be doing.
“At Booking.com, we are dedicated to the security and data protection of our guests,” a Booking.com spokesperson said in a statement to CyberGuy. “We recently noticed some suspicious activity involving unauthorized third parties being able to access some of our guests’ booking information, which may include booking details, names, email addresses and phone numbers and anything that travelers may have shared with the accommodation.”
“Financial information was not accessed from Booking.com’s systems, nor were guests’ physical addresses,” the spokesperson continued. “Upon discovering the activity, we took action to contain the issue. We have updated the PIN number for these reservations and informed our guests.”
APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE’S WALLET
A Booking.com breach exposed personal and reservation data that scammers can use to craft realistic fraud attempts. (Annette Riedl/picture alliance)
How scammers are using stolen booking data
A user who posted the notification on Reddit said that two weeks before receiving it, they got a phishing message on WhatsApp that included their real booking details and personal information. That timing matters. It suggests hackers may have already been using the data before many customers were notified.
It is not clear whether that earlier phishing attempt is directly tied to this specific breach, but it shows how detailed booking information can be used in targeted scams.
That is what makes this breach more dangerous than it first appears. When scammers know where you are staying and when, they can create messages that feel legitimate. A fake alert about a problem with your reservation or a request to confirm payment details suddenly looks real.
How past incidents highlight potential risks
This breach did not happen in a vacuum. In 2024, hackers infected computers at multiple hotels with a type of consumer-grade spyware known as stalkerware. In one documented case, a hotel employee was logged into their Booking.com admin portal when the software captured a screenshot of the screen, exposing visible customer data.
That detail points to a broader issue. In some cases, vulnerabilities may exist not just within a platform, but across the hotels and systems connected to it. The current breach may follow a similar pattern, though the company has not confirmed how the unauthorized access occurred.
To put the scale in context, Booking.com says 6.8 billion bookings have been made through the platform since 2010. Even a small percentage of affected users represents a large number of people.
NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS
A Booking.com breach exposed personal and reservation data that scammers can use to craft realistic fraud attempts. Security experts warn travelers to verify any message about their stay. (martin-dm/Getty Images)
Ways to stay safe after the Booking.com breach
You don’t have to swear off travel apps to protect yourself. A few targeted steps go a long way.
1) Check for an official notification
Check your email for a message from Booking.com. If you received one, take it seriously rather than filing it away. The company says it has updated PINs for affected reservations, but your account itself may still need attention.
2) Update your password now
Change your Booking.com password, especially if you reuse it anywhere else. Credential stuffing attacks are common after breaches, and reused passwords make it easy for hackers to break into other accounts. A password manager can help you create and store strong, unique passwords so you are not relying on the same one across multiple sites. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
3) Turn on two-factor authentication
Enable two-factor authentication (2FA) if you haven’t already. It adds a step, but it also blocks access even if someone has your password.
4) Consider identity theft protection
Even though financial data was not accessed, exposed personal details can still be used in scams or identity theft attempts. An identity protection service can monitor your information, alert you to suspicious activity and provide support if your identity is compromised. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
5) Watch for highly targeted phishing messages
Be skeptical of any message that references your booking details, whether it arrives by email, text or WhatsApp. Legitimate companies rarely ask you to click a link and re-enter payment information. Hackers with your booking data can write convincing fakes that look urgent.
6) Verify bookings through official channels
If you get a message about your reservation, do not click the link. Open the Booking.com app or type the website address manually. You can also contact the hotel directly using the number listed on its official website.
7) Add a safety net in case you click something malicious
If you accidentally click a suspicious link, strong antivirus software can help detect malicious websites or downloads before they cause damage. Look for tools that offer real-time protection and phishing detection, not just basic virus scans. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
8) Limit how your personal data is exposed online
Data brokers collect and sell personal details like your phone number and email address. That makes it easier for scammers to connect stolen booking data to a real person. Removing your information from these sites with a data removal service can reduce how often you are targeted. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
9) Report anything suspicious quickly
If you receive a phishing attempt that includes your real reservation details, contact Booking.com directly and report the message to your phone carrier or email provider. Reporting helps shut down scams faster.
Kurt’s key takeaways
Data breaches at major travel platforms are uncomfortable precisely because travel feels personal. Your itinerary, your accommodation and your plans are wrapped up in those booking details, and now someone else may have a copy. The good news is that financial information and home addresses were not part of this breach. The bad news is that the stolen data is detailed enough to be weaponized in targeted phishing attacks, and there’s evidence that it already has been. Booking.com updated its customers, reset PINs for affected reservations and publicly confirmed the incident. That’s more transparency than many companies offer. But the fact that users were receiving phishing messages on WhatsApp two weeks before the formal notification went out is worth sitting with. You can’t control whether the platform you use gets breached. You can control whether you’re an easy target once your data is out there.
How much responsibility should companies like Booking.com take when your personal data fuels scams? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
It’s amazing how good Alienware’s $350 OLED monitor is
I’ve recommended several OLED gaming monitors to readers over the years, and I’ve finally taken my own advice to buy one. Alienware’s new 27-inch 1440p QD-OLED has all the features that I want and a low $350 price that was too tempting to ignore.
The AW2726DM model has five things that make it stand out for the price: a 1440p QD-OLED screen with lush contrast, a fast 240Hz refresh rate, a semi-glossy screen coating to enhance details, a low-profile design without flashy RGB LEDs, and a great warranty (three years with coverage for burn-in).
I’ve been using Alienware’s new monitor for a couple days, and I’ve already spent hours with it playing Marathon. It was my first opportunity to see Bungie’s new first-person extraction shooter in its full HDR glory, and I can never go back. Switching on HDR wasn’t automatic, though it already looked so much better than my IPS panel without being activated.
Enabling it transformed how Marathon looked for the better, but made everything else about the OS look pretty washed-out. It’s a Windows issue, not an Alienware issue. It’s easy to enable HDR every time I launch a game and disable it afterward with the Windows + Alt + B keyboard shortcut, but unfortunately triggers HDR for all connected displays. This includes my IPS monitor that imbues everything with a terrible gray hue when HDR is on. So, using the system settings is the best way to adjust HDR for just the QD-OLED.
I landed on this QD-OLED after having spent a ton of time researching pricier models. The unanimous takeaway from reviewers was that LG’s Tandem RGB WOLED panels are some of the brightest out there, but also tend to exhibit lousy gray uniformity in dark scenes. QD-OLED monitors, on the other hand, offer slightly better contrast than WOLED and don’t suffer from those same uniformity issues. However, blacks sometimes appear as dark purple in bright rooms on QD-OLED panels, meaning they’re ideal for rooms that don’t have a bunch of light bouncing around.
There’s no perfect choice, and honestly I got tired of doing research, so I jumped in with the cheapest OLED. I’m glad that I did. Shopping for an OLED gaming monitor can be hard, but it can also be this easy. AOC makes a model that’s discounted to $339.99 at the time of publishing, and its specs are comparable.
As expected, the AW2726DM isn’t a cutting-edge monitor. Its QD-OLED panel isn’t as fast or as bright as some other pricier options, and it doesn’t have USB ports for connecting accessories. Considering its low price, it’s easy for me to overlook those omissions. I’d have a much harder time accepting them in a pricier display.
The fact that I mostly use my computer for text-based work at The Verge is what prevented me from upgrading to an OLED monitor. My 1440p IPS monitor is bright, it’s good at showing text clearly, and it has a fast refresh rate for gaming. Alienware’s QD-OLED is less bright, and some might be bothered by how text looks (I have to really squint to see the slight fringing from this QD-OLED’s subpixel layout). But I have a life outside of work, which includes playing a lot of PC games. That’s the slice of myself I bought this monitor for, and I’m so happy I did.
Photography by Cameron Faulkner / The Verge
-
Augusta, GA2 minutes ago
Start your engines: Augusta Tech gets $6.8M grant for new auto institute
-
Washington, D.C8 minutes agoLawton veteran returns from Oklahoma Warriors Honor Flight to Washington
-
Cleveland, OH14 minutes ago’27 DE Munir Lewis Commits to Louisville
-
Austin, TX20 minutes agoCentral Texas aquifers could see slight boost after week of rainfall
-
Alabama26 minutes agoAlabama QB Ty Simpson says faith in Jesus Christ fuels confidence heading into 2026 NFL Draft
-
Alaska32 minutes agoHawaiian and Alaska Airlines officially integrate digital services
-
Arizona38 minutes agoArizona Lottery Powerball, The Pick results for April 22, 2026
-
Arkansas44 minutes agoArkansas’ congressional delegation updates state business leaders on legislative priorities | Northwest Arkansas Democrat-Gazette