Cyber Security News

New Python NodeStealer Attacking Facebook Business To Steal Login Credentials

NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets Facebook Ads Manager accounts, stealing sensitive financial and business data in addition to credit card details and browser information. 

The malware is delivered through spear-phishing emails with malicious links, uses DLL sideloading and encoded PowerShell for stealthy execution, and exfiltrates data via Telegram. 

Infection chain

The attack commenced with a spear-phishing email, disguised as a copyright infringement notice, delivered from a compromised Gmail account, which enticed recipients to click on a malicious link concealed within a seemingly innocuous PDF document. 

Upon clicking, the infected PDF exploited vulnerabilities in the target devices, enabling the installation of stealthy malware. This insidious malware, once installed, secretly exfiltrated sensitive information from the compromised systems.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Email sample with the malicious embedded link

Clicking a malicious email link triggers the download of the zipped archive “Nombor Rekod 052881.zip.” Extracting the archive injects several suspicious files: “GHelper.dll” and “oledlg.dll” are likely Dynamic Link Libraries (DLLs) used by the malware. 

“Nombor Rekod 052881.exe” is the main executable file, while “hpreaderfprefs.dat” could be a data file for storing settings. 

The “images” folder contains a “.bat” batch script (“active-license.bat”) and a suspicious executable (“license-key.exe”), possibly used for licensing or further malicious actions, and  another archive, “license.rar,” might hold additional malware components. 

Malicious encoded PowerShell execution

The Nombor Rekod 052881.exe PDF reader was exploited to sideload the malicious oledlg.dll, which masquerading as a legitimate system file, executed a batch script, images\active-license.bat, under the guise of the PDF reader. 

This batch script, in turn, triggered a PowerShell command, enabling the malware to operate undetected and carry out its malicious activities. 

A malicious PowerShell script hides its window, creates a folder, and unarchives a password-protected RAR file containing a portable Python interpreter, which downloads and executes a decoy PDF while simultaneously dropping a persistence mechanism in the Startup folder.

It also downloads the final malicious payload directly from a remote server using Python’s `requests` library and executes it in a hidden command prompt. 

Python script to execute Python bytecode directly

It leverages obfuscation techniques to deliver an infostealer payload, as the malware initially downloads a Python script from a remote server and executes it in-memory, which decrypts and executes a second-stage payload, which is designed to steal sensitive information, including credit card data and web browser credentials. 

The malware also targets Facebook Ads Manager accounts to extract financial and business-related data, which is then exfiltrated to specific Telegram channels using a dedicated bot API. 

Targeting Facebook Ads Manager accounts

According to Trend Micro, NodeStealer, an advanced malware variant, targets Facebook Ads Manager accounts, credit card information, and browser data and employs sophisticated techniques to evade detection. 

To counter this threat, individuals and organizations should maintain vigilance against suspicious emails, educate users about phishing tactics, and regularly scan systems for malware. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Zero-Click Outlook RCE Vulnerability (CVE-2025-21298), PoC Released

Microsoft issued a critical patch to address CVE-2025-21298, a zero-click Remote Code Execution (RCE) vulnerability…

21 minutes ago

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular open-source…

10 hours ago

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing by…

10 hours ago

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also come…

16 hours ago

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers to…

16 hours ago

Nnice Ransomware Attacking Windows Systems With Advanced Encryption Techniques

CYFIRMA's Research and Advisory team has identified a new strain of ransomware labeled "Nnice," following…

16 hours ago