Facebook Sued Hong Kong Company For Hacking Facebook Users Account Using Malware & Run Malicious Ads

Facebook Filed a Lawsuit against the 2 Chinese Nations and Hong kong ad company allegedly hack Facebook user’s accounts to install the malware and use their account for running deceptive ads.

ILikeAd, a Hong Kong company, and two Chinese software developers are involved in this malicious practice and creating the malware to compromise the Facebook user’s account and run ads such as counterfeit goods and diet pills.

“Defendants Suid for violating Facebook Terms and Advertising Policies and they sometimes used images of celebrities in their ads to entice people to click on them, a practice known as “celeb bait.”  Facebook said.

“They are also involving in another practice known as cloaking. through which defendants deliberately disguised the true destination of the link in the ad by displaying one version of an ad’s landing page to Facebook’s systems and a different version to Facebook users. “

Cloaking is a sophisticated technique and well organized. it is very difficult to identify the person or company behind this malicious practice.

Facebook also said that it has also issued more than $4 million in refunds to customers whose accounts were used by ILikeAd to run unauthorized ads. “

“To protect Facebook users and disrupt these types of schemes, we will continue our work to detect malicious behavior directed towards our platform and enforce against violations of our Terms and Policies,” Facebook said.

We have recently reported another lawsuit filed by Facebook against Israel based commercial spyware maker NSO group for hacking its WhatsApp messenger by exploiting the zero-day vulnerability and deploy the Pegasus spyware on the targeted user’s device.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Beware Of Weaponized Air Force invitation PDF Targeting Indian Defense And Energy Sectors

EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies.  The attackers,…

51 mins ago

WarzoneRAT Returns Post FBI Seizure: Utilizing LNK & HTA File

The notorious WarzoneRAT malware has made a comeback, despite the FBI's recent efforts to dismantle its operations. Initially detected in…

54 mins ago

Google Revealed Kernel Address Sanitizer To Harden Android Firmware And Beyond

Android devices are popular among hackers due to the platform’s extensive acceptance and open-source nature. However, it has a big…

1 hour ago

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation, and growth. However, this shift towards…

1 hour ago

IT and security Leaders Feel Ill-Equipped to Handle Emerging Threats: New Survey

A comprehensive survey conducted by Keeper Security, in partnership with TrendCandy Research, has shed light on the growing concerns within…

5 hours ago

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse engineering .NET malware.  The write-up outlines…

6 hours ago