Saturday, April 5, 2025
HomeMalwareBeware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook...

Beware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook Messenger

Published on

SIEM as a Service

Follow Us on Google News

A New Malware Spreading Via Facebook Messenger which serving as both Malware and adware that can be used for earning clicks and Hijack the Browser on the victim.

Facebook is widely using the social platform and great source to spreading malicious file into many Facebook users.

This Malware using tons of domains to prevent tracking, and earning clicks with highly obfuscated and Advance code.

Attacker May spreading this Malware by using Stolen Facebook credentials hijacked browsers or clickjacking and other social engineering methods.

Also Read   Most important considerations with Malware Analysis Cheats And Tools list

Malware Functionality

According to Kaspersky Researcher, Attacker using Social Engineering attack that force to a user clicks the Link which is made as a Short link using Bitly shortens.

adware

Malware Link in FB Messanger

The link Contains a Google Doc which has a picture of the victims Facebook page that looks like a Playable Movie.

“When the victim clicks on the fake playable movie, the malware redirects them to a set of websites which enumerate their browser, operating system, and other vital information”

Researcher David Jacoby said,his technique is not new and has a lot of names. I would like to describe it as a domain chain, basically just A LOT of websites on different domains redirecting the user depending on some characteristics. It might be your language, geo location, browser information, operating system, installed plugins and cookies.

This information leads to visit some malicious websites tracking cookies, monitors your activity.

Human unknowingly clicking some links that are Probably not Recommended.but this will leads to force you to click the links that contain Malicious file.

Changing User-Agent header, this malware trick you and redirect you to some other malicious website that displaying a fake Flash Update notice, and then offered a Windows executable which tried in Firefox Browser by Researcher.

Force Download File from Firefox Browser 

when it tried in Chrome Browser, the link will redirect to a website which mimics the layout of YouTube, even including the YouTube logo which shows fake Error Message that leads to Download malicious Google Chrome extension from the Google Web Store.

adware   Force Download File from Chrome

Most of this malware sometimes leads to compromise the Facebook credentials and behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts.Kaspersky said.

still, Researchers analyzing this sample and how it actually spreads via Messenger is still unknown.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

Beware of Clickfix: ‘Fix Now’ and ‘Bot Verification’ Lures Deliver and Execute Malware

A sophisticated browser-based malware delivery method, dubbed ClickFix, has emerged as a significant threat...

DeepSeek-R1 Prompts Abused to Generate Advanced Malware and Phishing Sites

The release of DeepSeek-R1, a 671-billion-parameter large language model (LLM), has sparked significant interest...