New WhatsApp Malware “Maverick” Hijacks Accounts Through Fake Updates

Related

High-Severity Bug in Chrome’s Google Gemini AI Panel Could Have Enabled Hijacking

What happened Google patched a high-severity vulnerability (tracked as CVE-2026-0628)...

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti EPMM Devices

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

UK Warns of Iranian Cyberattack Risks Amid Middle East Conflict

What happened The UK National Cyber Security Centre (NCSC) issued...

CISOs to Watch in Massachusetts’ Insurance Industry

Massachusetts’ insurance sector includes regional carriers, global specialty insurers,...

Share

What happened

Security researchers have uncovered a new malware strain dubbed Maverick that targets WhatsApp users by posing as a legitimate app update. Once installed, it hijacks user sessions, steals authentication tokens, and gains access to personal chats and contacts.

Who is affected

The campaign primarily affects Android users who download fake WhatsApp updates from unofficial app stores or phishing links. Businesses using WhatsApp for customer communication or authentication are also at risk of data exposure.

Why CISOs should care

The Maverick malware highlights growing threats targeting widely used communication platforms. Attackers are exploiting trust in mobile apps to bypass multi-factor authentication and infiltrate enterprise networks through compromised personal devices. This underlines the importance of enforcing mobile application security and employee awareness.

3 practical actions

  1. Advise users to install apps and updates only from official sources such as Google Play or Apple’s App Store.

  2. Implement mobile device management (MDM) to restrict app installations and monitor suspicious activity.

  3. Educate employees on phishing and fake update campaigns to prevent credential theft and account compromise.