Friday, November 15, 2024
HomeMalwareNew Android Malware 'FlyTrap' Hacks Thousands of Facebook Accounts

New Android Malware ‘FlyTrap’ Hacks Thousands of Facebook Accounts

Published on

The cybersecurity team of zLabs Zimperium has recently detected several applications that have stolen the passwords of thousands of Facebook users. 

Not only this, but the Zlab security researchers have also checked this attack, and they claimed that the malware used in this attack was dubbed as “FlyTrap.”

According to the report, FlyTrap has been conducting all its attacks and operation from Vietnam. Apart from all this the experts also came to know that FlyTrap is a member of a trojan family that employs social engineering to win over its victims’ Facebook accounts.

- Advertisement - SIEM as a Service

The security researchers asserted that this malware has spread to nearly 10,000 users, and since March 2021, and it has been attacking in at least 144 countries.

Abilities of FlyTrap 

FlyTrap is a mobile application, that directly attacks the victim’s Facebook account with the trojan infecting their Android device. 

Here, methods and techniques that are used by social engineering are quite effective in the digitally connected world. Not only this, but different threat actors used this method to spread malware from one victim to another.

After hijacking the victim’s account the threat actors generally collects the data from the Android device of the victim’s, that’s why we have mentioned them below:-

  • Facebook ID
  • Location
  • Email address
  • IP address
  • Cookie associated with the Facebook account
  • Tokens associated with the Facebook account 

Luring Victims with High-quality apps 

The FlyTrap has a high-quality design, that is quite effective in nature and this application is being distributed through Google Play and third-party Android stores.

However, the malicious application starts luring by offering free coupon codes for Netflix as well as Google AdWords, and not only this but it also voted for the favorite soccer team or player, in the delayed UEFA Euro 2020 competition.

Victims of FlyTrap Trojan 

The experts have done a brief investigation, and they found that the database which has been stolen by the threat actors contains geolocation information of thousands of victims, and based on this information a victimology map has been generated. 

FlyTrap

FlyTrap Trojan Android Applications

The security analyst has found 9 applications that were involved in this malicious threat attack, and here we have mentioned them below:-

  • GG Voucher
  • Vote European Football
  • GG Coupon Ads
  • Chatfuel
  • GG Voucher Ads
  • GG Voucher
  • Net Coupon
  • Net Coupon
  • EURO 2021 Official

FlyTrap is an active malicious threat attack, and the experts are continuously trying to bypass this kind of attack. The tools and methods that were used by FlyTrap are quite effective and that’s what makes it powerful for the victims to detect the malware application.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware

A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...