Wednesday, June 19, 2024

Facebook Sued Hong Kong Company For Hacking Facebook Users Account Using Malware & Run Malicious Ads

Facebook Filed a Lawsuit against the 2 Chinese Nations and Hong kong ad company allegedly hack Facebook user’s accounts to install the malware and use their account for running deceptive ads.

ILikeAd, a Hong Kong company, and two Chinese software developers are involved in this malicious practice and creating the malware to compromise the Facebook user’s account and run ads such as counterfeit goods and diet pills.

“Defendants Suid for violating Facebook Terms and Advertising Policies and they sometimes used images of celebrities in their ads to entice people to click on them, a practice known as “celeb bait.”  Facebook said.

“They are also involving in another practice known as cloaking. through which defendants deliberately disguised the true destination of the link in the ad by displaying one version of an ad’s landing page to Facebook’s systems and a different version to Facebook users. “

Cloaking is a sophisticated technique and well organized. it is very difficult to identify the person or company behind this malicious practice.

Facebook also said that it has also issued more than $4 million in refunds to customers whose accounts were used by ILikeAd to run unauthorized ads. “

“To protect Facebook users and disrupt these types of schemes, we will continue our work to detect malicious behavior directed towards our platform and enforce against violations of our Terms and Policies,” Facebook said.

We have recently reported another lawsuit filed by Facebook against Israel based commercial spyware maker NSO group for hacking its WhatsApp messenger by exploiting the zero-day vulnerability and deploy the Pegasus spyware on the targeted user’s device.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles