Corporate entities in Hyderabad, India, are being targeted by a sophisticated and highly effective cyber fraud campaign that leverages WhatsApp Web to impersonate senior executives. The Hyderabad Police have issued a warning after several companies were duped out of large sums of money. The attack is a multi-stage process that combines phishing, malware, and social engineering. Attackers first gain remote access to a corporate computer via a malicious email link. They then lay dormant, waiting to hijack an active WhatsApp Web session belonging to a high-level executive. Using the executive's legitimate account, they send urgent payment instructions to the finance department, creating a sense of urgency to bypass normal verification procedures. This scheme's success lies in its use of a trusted communication channel to execute a classic business email compromise (BEC) style fraud.
The attack follows a clear and patient methodology:
This attack is a masterful blend of technical compromise and psychological manipulation.
T1566.002 - Spearphishing Link).T1219 - Remote Access Software).Mitigation requires a combination of technical controls and robust user training.
The most critical mitigation. Train all employees, especially finance staff, on BEC-style fraud and the importance of out-of-band verification for financial transactions.
Use EDR to detect and block the installation and execution of remote access trojans originating from phishing emails.
While not for WhatsApp, implementing MFA for approving financial transfers in the accounting system can provide a critical final checkpoint.
While this D3FEND technique cannot be applied to WhatsApp itself, it is the most critical control for the target of the fraud: the financial transaction. Companies must implement a non-negotiable policy that all wire transfers, especially those that are urgent or deviate from normal patterns, require multi-factor approval within the banking or accounting platform. The impersonation on WhatsApp is just the first step; the final action is the wire transfer. By requiring a second person (e.g., the controller) to approve the transfer using their own separate credentials and MFA token, the fraud is stopped. This creates a technical barrier that social engineering alone cannot bypass. The policy should be 'trust but verify,' and the verification must be technical, not just conversational.
This attack relies on social engineering, so technical controls should focus on user awareness and process hardening. The most effective countermeasure is mandatory, out-of-band verification for all financial transfer requests. This is a human-driven implementation of Job Function Access Pattern Analysis. The finance employee's job function includes processing payments, but the pattern of receiving an urgent, un-verifiable request via WhatsApp is anomalous. The organization must train employees to recognize this anomaly and enforce a strict procedure: any request for funds made via email, text, or chat MUST be verbally confirmed by calling the executive on their known, trusted phone number. The excuse 'I am in a meeting' should be the number one trigger to initiate this verification call. This process-level defense directly counters the social engineering aspect of the attack and is more effective than any endpoint tool in this scenario.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats