Sunday, July 14, 2024

New Android Malware ‘FlyTrap’ Hacks Thousands of Facebook Accounts

The cybersecurity team of zLabs Zimperium has recently detected several applications that have stolen the passwords of thousands of Facebook users. 

Not only this, but the Zlab security researchers have also checked this attack, and they claimed that the malware used in this attack was dubbed as “FlyTrap.”

According to the report, FlyTrap has been conducting all its attacks and operation from Vietnam. Apart from all this the experts also came to know that FlyTrap is a member of a trojan family that employs social engineering to win over its victims’ Facebook accounts.

The security researchers asserted that this malware has spread to nearly 10,000 users, and since March 2021, and it has been attacking in at least 144 countries.

Abilities of FlyTrap 

FlyTrap is a mobile application, that directly attacks the victim’s Facebook account with the trojan infecting their Android device. 

Here, methods and techniques that are used by social engineering are quite effective in the digitally connected world. Not only this, but different threat actors used this method to spread malware from one victim to another.

After hijacking the victim’s account the threat actors generally collects the data from the Android device of the victim’s, that’s why we have mentioned them below:-

  • Facebook ID
  • Location
  • Email address
  • IP address
  • Cookie associated with the Facebook account
  • Tokens associated with the Facebook account 

Luring Victims with High-quality apps 

The FlyTrap has a high-quality design, that is quite effective in nature and this application is being distributed through Google Play and third-party Android stores.

However, the malicious application starts luring by offering free coupon codes for Netflix as well as Google AdWords, and not only this but it also voted for the favorite soccer team or player, in the delayed UEFA Euro 2020 competition.

Victims of FlyTrap Trojan 

The experts have done a brief investigation, and they found that the database which has been stolen by the threat actors contains geolocation information of thousands of victims, and based on this information a victimology map has been generated. 


FlyTrap Trojan Android Applications

The security analyst has found 9 applications that were involved in this malicious threat attack, and here we have mentioned them below:-

  • GG Voucher
  • Vote European Football
  • GG Coupon Ads
  • Chatfuel
  • GG Voucher Ads
  • GG Voucher
  • Net Coupon
  • Net Coupon
  • EURO 2021 Official

FlyTrap is an active malicious threat attack, and the experts are continuously trying to bypass this kind of attack. The tools and methods that were used by FlyTrap are quite effective and that’s what makes it powerful for the victims to detect the malware application.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles