Sunday, May 18, 2025
HomeMalwareBeware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook...

Beware: Highly Obfuscated Multi Platform Malware & Adware Spreading Through Facebook Messenger

Published on

SIEM as a Service

Follow Us on Google News

A New Malware Spreading Via Facebook Messenger which serving as both Malware and adware that can be used for earning clicks and Hijack the Browser on the victim.

Facebook is widely using the social platform and great source to spreading malicious file into many Facebook users.

This Malware using tons of domains to prevent tracking, and earning clicks with highly obfuscated and Advance code.

- Advertisement - Google News

Attacker May spreading this Malware by using Stolen Facebook credentials hijacked browsers or clickjacking and other social engineering methods.

Also Read   Most important considerations with Malware Analysis Cheats And Tools list

Malware Functionality

According to Kaspersky Researcher, Attacker using Social Engineering attack that force to a user clicks the Link which is made as a Short link using Bitly shortens.

adware

Malware Link in FB Messanger

The link Contains a Google Doc which has a picture of the victims Facebook page that looks like a Playable Movie.

“When the victim clicks on the fake playable movie, the malware redirects them to a set of websites which enumerate their browser, operating system, and other vital information”

Researcher David Jacoby said,his technique is not new and has a lot of names. I would like to describe it as a domain chain, basically just A LOT of websites on different domains redirecting the user depending on some characteristics. It might be your language, geo location, browser information, operating system, installed plugins and cookies.

This information leads to visit some malicious websites tracking cookies, monitors your activity.

Human unknowingly clicking some links that are Probably not Recommended.but this will leads to force you to click the links that contain Malicious file.

Changing User-Agent header, this malware trick you and redirect you to some other malicious website that displaying a fake Flash Update notice, and then offered a Windows executable which tried in Firefox Browser by Researcher.

Force Download File from Firefox Browser 

when it tried in Chrome Browser, the link will redirect to a website which mimics the layout of YouTube, even including the YouTube logo which shows fake Error Message that leads to Download malicious Google Chrome extension from the Google Web Store.

adware   Force Download File from Chrome

Most of this malware sometimes leads to compromise the Facebook credentials and behind this are most likely making a lot of money in ads and getting access to a lot of Facebook accounts.Kaspersky said.

still, Researchers analyzing this sample and how it actually spreads via Messenger is still unknown.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious...

Frigidstealer Malware Targets macOS Users to Harvest Login Credentials

An macOS users, a new information-stealing malware dubbed FrigidStealer has emerged as a formidable...

SSH Auth Key Reuse Uncovers Advanced Targeted Phishing Campaign

A meticulously orchestrated phishing campaign targeting Kuwait's fisheries, telecommunications, and insurance sectors has been...