Spam using WhatsApp voice mail




I wrote before about various tricks that cybercriminals use to attract people to do something (btw, this is called “social engineering”). This time, they make use of the well-known WhatsApp (written like I did and not like in the screenshot below) to redirect users to an online pharmacy website.




The funny thing is that the link behind the button “autoplay” goes to an IP address hosting a file with extension PL (coming from Perl) which means usually a script. The file contains just minimal JS code to redirect to the pharmacy page.

The email pretends to come from Whats App Reminder <> which has nothing to do with WhatsApp. Of course, if you look in the headers, you see that the email address is spoofed.



What do we learn from here?

1. Always have a look at the sender and the recipient

2. Don’t ignore the small things like “WhatsApp” vs. “Whats App”. Usually the fraudsters don’t pay attention to details. You should.

3. Have a look where you click. The link behind the button should be inside the official domain (like and not to some strange server.



© Copyright Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity

Check for seeing the consulting services we offer.

Visit for latest security news in English
Besuchen Sie für IT Sicherheits News auf Deutsch

About the Author

Sorin Mustaca
Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+ and Project+, is working since over 20 years in the IT Security industry and worked between 2003-2014 for Avira as Product Manager for the known products used by over 100 million users world-wide. Today he is CEO and owner of Endpoint Cybersecurity GmbH focusing on Cybersecurity, secure software development and security for IoT and Automotive. He is also running his personal blog Sorin Mustaca on Cybersecurity and is the author of the free eBook Improve your security .

Comments are closed.

%d bloggers like this: