NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

November 3, 2023 at 09:42AM

Facebook business accounts have been compromised and used to run fake ads featuring revealing photos of young women as bait to trick victims into downloading malware called NodeStealer. Clicking on the ads downloads a malicious .exe file that steals browser cookies and passwords. The malware is part of a growing cybercrime ecosystem in Vietnam, primarily using Facebook ads for propagation. The goal is to bypass security measures and take over victims’ accounts. Other recent attacks include account takeovers on betting platforms and scams targeting users of the Roblox gaming platform.

Meeting Notes – Nov 03, 2023

Topic: Online Security / Malware – Compromised Facebook business accounts and cybercrime activities.

Key Points:
– Compromised Facebook business accounts are being used to run bogus ads that lure victims into downloading malware called NodeStealer.
– Clicking on the ads downloads an archive containing a malicious .exe file that steals browser cookies and passwords.
– NodeStealer is a JavaScript malware that facilitates the takeover of Facebook accounts.
– The threat actors behind the operation have now been using a Python-based variant of the malware.
– Cybercrime activities involving advertising-as-a-vector on Facebook are on the rise in Vietnam.
– The latest campaign discovered by Bitdefender targets male users on Facebook, primarily aged 45+ from Europe, Africa, and the Caribbean.
– The attacks have expanded to include regular Facebook users and utilize Windows executable files disguised as photo albums.
– The stolen cookies are leveraged to bypass security mechanisms like two-factor authentication and change the passwords, effectively locking victims out of their accounts.
– The article also mentions other types of account takeover attacks, such as the Capra attack aimed at betting platforms and phishing scams targeting Roblox users.
– CloudSEK discovered a two-year-long data harvesting campaign in the Middle East using fake real estate-related domains to collect information and sell it on underground forums.

Action Items:
– Stay vigilant and reinforce online security measures, especially two-factor authentication.
– Educate users, especially younger ones, about spotting scams and practicing safe online behavior.
– Monitor for any signs of compromised Facebook accounts or suspicious ads.
– Follow industry news and updates to stay informed about the latest cyber threats.

Please let me know if there is anything else I can assist you with.

Full Article