Saturday, June 22, 2024

Beware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook Messenger

A New Malware Spreading Via Facebook Messenger which serving as both Malware and adware that can be used for earning clicks and Hijack the Browser on the victim.

Facebook is widely using the social platform and great source to spreading malicious file into many Facebook users.

This Malware using tons of domains to prevent tracking, and earning clicks with highly obfuscated and Advance code.

Attacker May spreading this Malware by using Stolen Facebook credentials hijacked browsers or clickjacking and other social engineering methods.

Also Read   Most important considerations with Malware Analysis Cheats And Tools list

Malware Functionality

According to Kaspersky Researcher, Attacker using Social Engineering attack that force to a user clicks the Link which is made as a Short link using Bitly shortens.

adware

Malware Link in FB Messanger

The link Contains a Google Doc which has a picture of the victims Facebook page that looks like a Playable Movie.

“When the victim clicks on the fake playable movie, the malware redirects them to a set of websites which enumerate their browser, operating system, and other vital information”

Researcher David Jacoby said,his technique is not new and has a lot of names. I would like to describe it as a domain chain, basically just A LOT of websites on different domains redirecting the user depending on some characteristics. It might be your language, geo location, browser information, operating system, installed plugins and cookies.

This information leads to visit some malicious websites tracking cookies, monitors your activity.

Human unknowingly clicking some links that are Probably not Recommended.but this will leads to force you to click the links that contain Malicious file.

Changing User-Agent header, this malware trick you and redirect you to some other malicious website that displaying a fake Flash Update notice, and then offered a Windows executable which tried in Firefox Browser by Researcher.

Force Download File from Firefox Browser 

when it tried in Chrome Browser, the link will redirect to a website which mimics the layout of YouTube, even including the YouTube logo which shows fake Error Message that leads to Download malicious Google Chrome extension from the Google Web Store.

adware   Force Download File from Chrome

Most of this malware sometimes leads to compromise the Facebook credentials and behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts.Kaspersky said.

still, Researchers analyzing this sample and how it actually spreads via Messenger is still unknown.

Website

Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from Promokit.eu for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles