Tuesday, April 1, 2025
HomeMalwareNew Android Malware 'FlyTrap' Hacks Thousands of Facebook Accounts

New Android Malware ‘FlyTrap’ Hacks Thousands of Facebook Accounts

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity team of zLabs Zimperium has recently detected several applications that have stolen the passwords of thousands of Facebook users. 

Not only this, but the Zlab security researchers have also checked this attack, and they claimed that the malware used in this attack was dubbed as “FlyTrap.”

According to the report, FlyTrap has been conducting all its attacks and operation from Vietnam. Apart from all this the experts also came to know that FlyTrap is a member of a trojan family that employs social engineering to win over its victims’ Facebook accounts.

The security researchers asserted that this malware has spread to nearly 10,000 users, and since March 2021, and it has been attacking in at least 144 countries.

Abilities of FlyTrap 

FlyTrap is a mobile application, that directly attacks the victim’s Facebook account with the trojan infecting their Android device. 

Here, methods and techniques that are used by social engineering are quite effective in the digitally connected world. Not only this, but different threat actors used this method to spread malware from one victim to another.

After hijacking the victim’s account the threat actors generally collects the data from the Android device of the victim’s, that’s why we have mentioned them below:-

  • Facebook ID
  • Location
  • Email address
  • IP address
  • Cookie associated with the Facebook account
  • Tokens associated with the Facebook account 

Luring Victims with High-quality apps 

The FlyTrap has a high-quality design, that is quite effective in nature and this application is being distributed through Google Play and third-party Android stores.

However, the malicious application starts luring by offering free coupon codes for Netflix as well as Google AdWords, and not only this but it also voted for the favorite soccer team or player, in the delayed UEFA Euro 2020 competition.

Victims of FlyTrap Trojan 

The experts have done a brief investigation, and they found that the database which has been stolen by the threat actors contains geolocation information of thousands of victims, and based on this information a victimology map has been generated. 

FlyTrap

FlyTrap Trojan Android Applications

The security analyst has found 9 applications that were involved in this malicious threat attack, and here we have mentioned them below:-

  • GG Voucher
  • Vote European Football
  • GG Coupon Ads
  • Chatfuel
  • GG Voucher Ads
  • GG Voucher
  • Net Coupon
  • Net Coupon
  • EURO 2021 Official

FlyTrap is an active malicious threat attack, and the experts are continuously trying to bypass this kind of attack. The tools and methods that were used by FlyTrap are quite effective and that’s what makes it powerful for the victims to detect the malware application.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Cisco Smart Licensing Utility Credential Flaw Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning organizations...

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

A wave of malicious activity targeting Palo Alto Networks PAN-OS GlobalProtect portals has been...

Linux Lite 7.4 Final Released: Enhanced GUI and Bug Fixes

Linux Lite, a popular lightweight Linux distribution aimed at making Linux accessible to beginners,...

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth...

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows...