Wednesday, April 23, 2025
HomeComputer SecurityMalicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

Malicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

Published on

SIEM as a Service

Follow Us on Google News

A new variant of FacexWorm spreads through Facebook Messenger targets the users of cryptocurrency trading platforms if accessed from the affected browsers.

FacexWorm is not new, it was detected in August 2017, the Modus operandi is same as like it’s previous campaigns, but the new variant is focussed on cryptocurrency users Credentials.

Security researchers from Trend Micro identified the Malicious chrome Extension dubbed FacexWorm surfacing in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain.

- Advertisement - Google News

Attack and propagation – FacexWorm

Attackers distribute the malicious link to friends of the affected Facebook account, upon clicking the URL it redirects the user’s to a fake Youtube page and installs the FacexWorm Chrome Extension.

Once the extension installed and permissions granted it downloads and install the malicious javascript from the command and control server. Then it establishes communication again with C&C to check the propagation function.

If the propagation function is enabled then it performs a sequence of queries to obtain account’s friend list and sends fake YouTube video links again to contacts who are in online or idle status. Researchers say it performs the following functions.

It steals weblogin credentials of selected websites (Google, MyMonero, and Coinhive ) by injecting a function that send’s the credentials to C&C server after the form filled and login button is clicked.

Once the victim open’s the cryptocurrency transaction page it locates the address keys and replaces it with the address provided by the attackers for trading platforms such as Poloniex, HitBTC, Bitfinex, Ethfinex, and Binance, and the wallet Blockchain.info. Cryptocurrencies targeted include Bitcoin (BTC), Bitcoin Gold (BTG), Bitcoin Cash (BCH), Dash (DASH), ETH, Ethereum Classic (ETC), Ripple (XRP), Litecoin (LTC), Zcash (ZEC), and Monero (XMR).

FacexWorm also redirects the victims to cryptocurrency scam page if it detects that the user is accessing any of the 52 cryptocurrency trading platforms it targets, or if the user is keying in keywords such as “blockchain,” “eth-,” or “ethereum” in the URL.

The referral redirection takes the victims to Binance, DigitalOcean, FreeBitco[.]in, FreeDoge[.]co[.]in, and HashFlare.

Trend Micro says “While we’ve so far only found one Bitcoin transaction compromised by FacexWorm when we checked the attacker’s address/wallet, we don’t know how much has been earned from the malicious web mining”.

The malicious extension implements persistence mechanism by preventing the victims removing the malicious extension. If it detects victims opening the chrome extension management “chrome://extensions/” then it closes the page immediately.

Researchers says “Attackers keeps trying to upload new FacexWorm extensions to the Chrome Web Store, we found that they are also punctually removed from the store. We also noticed that Facebook Messenger can detect the malicious, socially engineered links and duly blocks the propagation behavior of the affected account.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries...

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021,...

Super-Smart AI Could Launch Attacks Sooner Than We Think

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...