A new variant of FacexWorm spreads through Facebook Messenger targets the users of cryptocurrency trading platforms if accessed from the affected browsers.
FacexWorm is not new, it was detected in August 2017, the Modus operandi is same as like it’s previous campaigns, but the new variant is focussed on cryptocurrency users Credentials.
Security researchers from Trend Micro identified the Malicious chrome Extension dubbed FacexWorm surfacing in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain.
Attackers distribute the malicious link to friends of the affected Facebook account, upon clicking the URL it redirects the user’s to a fake Youtube page and installs the FacexWorm Chrome Extension.
Once the extension installed and permissions granted it downloads and install the malicious javascript from the command and control server. Then it establishes communication again with C&C to check the propagation function.
If the propagation function is enabled then it performs a sequence of queries to obtain account’s friend list and sends fake YouTube video links again to contacts who are in online or idle status. Researchers say it performs the following functions.
It steals weblogin credentials of selected websites (Google, MyMonero, and Coinhive ) by injecting a function that send’s the credentials to C&C server after the form filled and login button is clicked.
Once the victim open’s the cryptocurrency transaction page it locates the address keys and replaces it with the address provided by the attackers for trading platforms such as Poloniex, HitBTC, Bitfinex, Ethfinex, and Binance, and the wallet Blockchain.info. Cryptocurrencies targeted include Bitcoin (BTC), Bitcoin Gold (BTG), Bitcoin Cash (BCH), Dash (DASH), ETH, Ethereum Classic (ETC), Ripple (XRP), Litecoin (LTC), Zcash (ZEC), and Monero (XMR).
FacexWorm also redirects the victims to cryptocurrency scam page if it detects that the user is accessing any of the 52 cryptocurrency trading platforms it targets, or if the user is keying in keywords such as “blockchain,” “eth-,” or “ethereum” in the URL.
The referral redirection takes the victims to Binance, DigitalOcean, FreeBitco[.]in, FreeDoge[.]co[.]in, and HashFlare.
Trend Micro says “While we’ve so far only found one Bitcoin transaction compromised by FacexWorm when we checked the attacker’s address/wallet, we don’t know how much has been earned from the malicious web mining”.
The malicious extension implements persistence mechanism by preventing the victims removing the malicious extension. If it detects victims opening the chrome extension management “chrome://extensions/” then it closes the page immediately.
Researchers says “Attackers keeps trying to upload new FacexWorm extensions to the Chrome Web Store, we found that they are also punctually removed from the store. We also noticed that Facebook Messenger can detect the malicious, socially engineered links and duly blocks the propagation behavior of the affected account.”
The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…