Tuesday, October 15, 2024
HomeMalwareBeware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook...

Beware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook Messenger

Published on

Malware protection

A New Malware Spreading Via Facebook Messenger which serving as both Malware and adware that can be used for earning clicks and Hijack the Browser on the victim.

Facebook is widely using the social platform and great source to spreading malicious file into many Facebook users.

This Malware using tons of domains to prevent tracking, and earning clicks with highly obfuscated and Advance code.

- Advertisement - SIEM as a Service

Attacker May spreading this Malware by using Stolen Facebook credentials hijacked browsers or clickjacking and other social engineering methods.

Also Read   Most important considerations with Malware Analysis Cheats And Tools list

Malware Functionality

According to Kaspersky Researcher, Attacker using Social Engineering attack that force to a user clicks the Link which is made as a Short link using Bitly shortens.

adware

Malware Link in FB Messanger

The link Contains a Google Doc which has a picture of the victims Facebook page that looks like a Playable Movie.

“When the victim clicks on the fake playable movie, the malware redirects them to a set of websites which enumerate their browser, operating system, and other vital information”

Researcher David Jacoby said,his technique is not new and has a lot of names. I would like to describe it as a domain chain, basically just A LOT of websites on different domains redirecting the user depending on some characteristics. It might be your language, geo location, browser information, operating system, installed plugins and cookies.

This information leads to visit some malicious websites tracking cookies, monitors your activity.

Human unknowingly clicking some links that are Probably not Recommended.but this will leads to force you to click the links that contain Malicious file.

Changing User-Agent header, this malware trick you and redirect you to some other malicious website that displaying a fake Flash Update notice, and then offered a Windows executable which tried in Firefox Browser by Researcher.

Force Download File from Firefox Browser 

when it tried in Chrome Browser, the link will redirect to a website which mimics the layout of YouTube, even including the YouTube logo which shows fake Error Message that leads to Download malicious Google Chrome extension from the Google Web Store.

adware   Force Download File from Chrome

Most of this malware sometimes leads to compromise the Facebook credentials and behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts.Kaspersky said.

still, Researchers analyzing this sample and how it actually spreads via Messenger is still unknown.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla,...

ErrorFather Hackers Attacking & Control Android Device Remotely

The Cerberus Android banking trojan, which gained notoriety in 2019 for its ability to...

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

HORUS Protector Delivering AgentTesla, Remcos, Snake, NjRat Malware

The Horus Protector crypter is being used to distribute various malware families, including AgentTesla,...

CoreWarrior Malware Attacking Windows Machines From Dozens Of IP Address

Researchers recently analyzed a CoreWarrior malware sample, which spreads aggressively by creating numerous copies...

TrickMo Malware Targets Android Devices to Steal Unlock Patterns and PINs

The recent discovery of the TrickMo Banking Trojan variant by Cleafy has prompted further...