Unraveling water saci’s new multi-format, ai-enhanced attacks propagated via whatsapp

Intel Name: Unraveling water saci’s new multi-format, ai-enhanced attacks propagated via whatsapp

Date of Scan: December 3, 2025

Impact: High

Summary:
The Water Saci campaign in Brazil employs a heavily layered attack chain using multiple file formats—HTA, ZIP, and PDF—to evade simple detection and complicate analysis. Recently, attackers shifted from PowerShell to a Python-based propagation routine, enabling broader browser compatibility, improved error handling, and faster automated malware delivery through WhatsApp Web. Evidence indicates they may have leveraged AI/LLM tools to convert and enhance their scripts, resulting in more efficient batch messaging and execution.

More Details