Monday, May 19, 2025
HomeComputer SecurityMalicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

Malicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

Published on

SIEM as a Service

Follow Us on Google News

A new variant of FacexWorm spreads through Facebook Messenger targets the users of cryptocurrency trading platforms if accessed from the affected browsers.

FacexWorm is not new, it was detected in August 2017, the Modus operandi is same as like it’s previous campaigns, but the new variant is focussed on cryptocurrency users Credentials.

Security researchers from Trend Micro identified the Malicious chrome Extension dubbed FacexWorm surfacing in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain.

- Advertisement - Google News

Attack and propagation – FacexWorm

Attackers distribute the malicious link to friends of the affected Facebook account, upon clicking the URL it redirects the user’s to a fake Youtube page and installs the FacexWorm Chrome Extension.

Once the extension installed and permissions granted it downloads and install the malicious javascript from the command and control server. Then it establishes communication again with C&C to check the propagation function.

If the propagation function is enabled then it performs a sequence of queries to obtain account’s friend list and sends fake YouTube video links again to contacts who are in online or idle status. Researchers say it performs the following functions.

It steals weblogin credentials of selected websites (Google, MyMonero, and Coinhive ) by injecting a function that send’s the credentials to C&C server after the form filled and login button is clicked.

Once the victim open’s the cryptocurrency transaction page it locates the address keys and replaces it with the address provided by the attackers for trading platforms such as Poloniex, HitBTC, Bitfinex, Ethfinex, and Binance, and the wallet Blockchain.info. Cryptocurrencies targeted include Bitcoin (BTC), Bitcoin Gold (BTG), Bitcoin Cash (BCH), Dash (DASH), ETH, Ethereum Classic (ETC), Ripple (XRP), Litecoin (LTC), Zcash (ZEC), and Monero (XMR).

FacexWorm also redirects the victims to cryptocurrency scam page if it detects that the user is accessing any of the 52 cryptocurrency trading platforms it targets, or if the user is keying in keywords such as “blockchain,” “eth-,” or “ethereum” in the URL.

The referral redirection takes the victims to Binance, DigitalOcean, FreeBitco[.]in, FreeDoge[.]co[.]in, and HashFlare.

Trend Micro says “While we’ve so far only found one Bitcoin transaction compromised by FacexWorm when we checked the attacker’s address/wallet, we don’t know how much has been earned from the malicious web mining”.

The malicious extension implements persistence mechanism by preventing the victims removing the malicious extension. If it detects victims opening the chrome extension management “chrome://extensions/” then it closes the page immediately.

Researchers says “Attackers keeps trying to upload new FacexWorm extensions to the Chrome Web Store, we found that they are also punctually removed from the store. We also noticed that Facebook Messenger can detect the malicious, socially engineered links and duly blocks the propagation behavior of the affected account.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems

A reliable VMware environment reporting tool, RVTools, was momentarily infiltrated earlier this week on...

Confluence Servers Under Attack: Hackers Leverage Vulnerability for RDP Access and Remote Code Execution

Threat actors exploited a known vulnerability, CVE-2023-22527, a template injection flaw in Atlassian Confluence...

New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

AhnLab Security Intelligence Center (ASEC) has recently uncovered a malicious campaign distributing ModiLoader (also...

Health Care Data Breach Costs BreachForums Admin $700,000 Fine

Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime forum Breachforums, will forfeit approximately...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...