Tuesday, February 25, 2025
HomeMalwareBeware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook...

Beware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook Messenger

Published on

SIEM as a Service

Follow Us on Google News

A New Malware Spreading Via Facebook Messenger which serving as both Malware and adware that can be used for earning clicks and Hijack the Browser on the victim.

Facebook is widely using the social platform and great source to spreading malicious file into many Facebook users.

This Malware using tons of domains to prevent tracking, and earning clicks with highly obfuscated and Advance code.

Attacker May spreading this Malware by using Stolen Facebook credentials hijacked browsers or clickjacking and other social engineering methods.

Also Read   Most important considerations with Malware Analysis Cheats And Tools list

Malware Functionality

According to Kaspersky Researcher, Attacker using Social Engineering attack that force to a user clicks the Link which is made as a Short link using Bitly shortens.

adware

Malware Link in FB Messanger

The link Contains a Google Doc which has a picture of the victims Facebook page that looks like a Playable Movie.

“When the victim clicks on the fake playable movie, the malware redirects them to a set of websites which enumerate their browser, operating system, and other vital information”

Researcher David Jacoby said,his technique is not new and has a lot of names. I would like to describe it as a domain chain, basically just A LOT of websites on different domains redirecting the user depending on some characteristics. It might be your language, geo location, browser information, operating system, installed plugins and cookies.

This information leads to visit some malicious websites tracking cookies, monitors your activity.

Human unknowingly clicking some links that are Probably not Recommended.but this will leads to force you to click the links that contain Malicious file.

Changing User-Agent header, this malware trick you and redirect you to some other malicious website that displaying a fake Flash Update notice, and then offered a Windows executable which tried in Firefox Browser by Researcher.

Force Download File from Firefox Browser 

when it tried in Chrome Browser, the link will redirect to a website which mimics the layout of YouTube, even including the YouTube logo which shows fake Error Message that leads to Download malicious Google Chrome extension from the Google Web Store.

adware   Force Download File from Chrome

Most of this malware sometimes leads to compromise the Facebook credentials and behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts.Kaspersky said.

still, Researchers analyzing this sample and how it actually spreads via Messenger is still unknown.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Malware Delivered Through Weaponized Files Disguised as Videos

The Lumma Stealer malware, a sophisticated infostealer, is being actively distributed through malicious files...

New Attack Hijacks Popular YouTube Gaming Channels to Steal Steam Accounts

Cybersecurity researchers at Bitdefender Labs have uncovered a sophisticated scam targeting the Counter-Strike 2...

Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites

In a widespread cyberattack, over 35,000 websites have been compromised by a malicious campaign...

Researchers Jailbreak OpenAI o1/o3, DeepSeek-R1, and Gemini 2.0 Flash Models

Researchers from Duke University and Carnegie Mellon University have demonstrated successful jailbreaks of OpenAI’s...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lumma Stealer Malware Delivered Through Weaponized Files Disguised as Videos

The Lumma Stealer malware, a sophisticated infostealer, is being actively distributed through malicious files...

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows...

200 Malicious GitHub Repositories Distributing Malware to Developers

A sophisticated malware campaign dubbed GitVenom has infected over 200 GitHub repositories, targeting developers with fake...