Thursday, March 28, 2024

Malicious Chrome Extension FacexWorm Spreads Through Facebook Messenger

A new variant of FacexWorm spreads through Facebook Messenger targets the users of cryptocurrency trading platforms if accessed from the affected browsers.

FacexWorm is not new, it was detected in August 2017, the Modus operandi is same as like it’s previous campaigns, but the new variant is focussed on cryptocurrency users Credentials.

Security researchers from Trend Micro identified the Malicious chrome Extension dubbed FacexWorm surfacing in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain.

Attack and propagation – FacexWorm

Attackers distribute the malicious link to friends of the affected Facebook account, upon clicking the URL it redirects the user’s to a fake Youtube page and installs the FacexWorm Chrome Extension.

Once the extension installed and permissions granted it downloads and install the malicious javascript from the command and control server. Then it establishes communication again with C&C to check the propagation function.

If the propagation function is enabled then it performs a sequence of queries to obtain account’s friend list and sends fake YouTube video links again to contacts who are in online or idle status. Researchers say it performs the following functions.

It steals weblogin credentials of selected websites (Google, MyMonero, and Coinhive ) by injecting a function that send’s the credentials to C&C server after the form filled and login button is clicked.

Once the victim open’s the cryptocurrency transaction page it locates the address keys and replaces it with the address provided by the attackers for trading platforms such as Poloniex, HitBTC, Bitfinex, Ethfinex, and Binance, and the wallet Blockchain.info. Cryptocurrencies targeted include Bitcoin (BTC), Bitcoin Gold (BTG), Bitcoin Cash (BCH), Dash (DASH), ETH, Ethereum Classic (ETC), Ripple (XRP), Litecoin (LTC), Zcash (ZEC), and Monero (XMR).

FacexWorm also redirects the victims to cryptocurrency scam page if it detects that the user is accessing any of the 52 cryptocurrency trading platforms it targets, or if the user is keying in keywords such as “blockchain,” “eth-,” or “ethereum” in the URL.

The referral redirection takes the victims to Binance, DigitalOcean, FreeBitco[.]in, FreeDoge[.]co[.]in, and HashFlare.

Trend Micro says “While we’ve so far only found one Bitcoin transaction compromised by FacexWorm when we checked the attacker’s address/wallet, we don’t know how much has been earned from the malicious web mining”.

The malicious extension implements persistence mechanism by preventing the victims removing the malicious extension. If it detects victims opening the chrome extension management “chrome://extensions/” then it closes the page immediately.

Researchers says “Attackers keeps trying to upload new FacexWorm extensions to the Chrome Web Store, we found that they are also punctually removed from the store. We also noticed that Facebook Messenger can detect the malicious, socially engineered links and duly blocks the propagation behavior of the affected account.”

Website

Latest articles

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles