Tuesday, March 4, 2025
HomeSecurity NewsFacebook Vulnerability May Allow an Attacker to Perform Phishing Attack

Facebook Vulnerability May Allow an Attacker to Perform Phishing Attack

Published on

SIEM as a Service

Follow Us on Google News

The Facebook vulnerability may allow attackers to create a phishing attack through the trusted domain. The Vulnerability resides in validating the contents of the files posted through links and Unvalidated re-directions.

The Vulnerability was identified by Rajwinder Singh, he posted a malicious office macro file that contains reverse shell payload in the Facebook post section.

Rajwinder from ProVise Secure Lab, also published a PoC demonstrating the vulnerability. He created a Payload with msfvenom and obfuscated VBA Scripts with Chrw() function that returns a Unicode character, if in case Unicode is not supported by the system it acts as Chr function which returns ASCII or ANSI character.

Also Read Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website

Then the link containing the file added in post section, so now you will get a link generated for the post. Also, he noticed the file is getting downloaded from an external link, which indicates ‘Open Redirection‘ vulnerability.

Facebook vulnerability

And he passed the file through facebook messenger, which generates its own link. Now the file is being downloaded by the victim from the Facebook domain “https://cdn.fbsbx.com”.

Facebook vulnerability

In the victims, machine file was downloaded successfully and he also got the reverse Shell back once the file is opened in the victim machine.

Latest articles

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Hackers Exploiting Business Relationships to Attack Arab Emirates Aviation Sector

A sophisticated cyber espionage campaign targeting the aviation and satellite communications sectors in the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...