This new malware can control Facebook business accounts: Report – Times of India


Researchers have discovered a previously unreported phishing campaign distributing info-stealing malware. According to a report by Palo Alto Networks’ Unit 42, this malware can take over Facebook business accounts through malicious links masquerading as office tools like spreadsheet templates. Unlike the version Meta reported in May 2023, this new variant (NodeStealer 2.0, written in Python) can steal cryptocurrency and use Telegramto exfiltrate data as well.This indicates a growing trend of scammers targeting Facebook business accounts – for advertising fraud and financial gains.

How this malware can affect users
In December 2022, a phishing campaign was used for delivering two variants of malware. The attacker used multiple Facebook pages and users to post information luring victims to download a link from known cloud file storage providers. After clicking, a .zip file was downloaded, containing the malicious infostealer .exe files. The report has also shared an example of the Facebook phishing post luring victims to download the infected .zip file.

The first variant creates various processes that could be considered abnormal activity indicators, including shutting pop-up windows on the graphical user interface (GUI). Meanwhile, the second variant is more discrete making it tougher to identify malicious activity.

Both variants can steal Facebook business account credentials by connecting to the Meta Graph API with the victim’s user ID and access token. The Graph API is the primary way to get data in and out of Facebook and can be used to programmatically query data, post, manage ads and more.

It is used to steal information about the target’s follower count, user verification status, whether the account is prepaid and send it to the command and control server (C2). They also attempt to steal the login credentials by checking the cookies and local databases of the most common browsers.
In comparison, the second variant goes one step further by replacing the legitimate user’s email address with a mailbox under the cyberattacker’s control, thereby locking them out of the account indefinitely.



News India24

Share
Published by
News India24

Recent Posts

मथुरा में पानी की टंकी गिरने से 2 की मौत, परिजन घायल; रेस्क्यू ऑपरेशन जारी – India TV Hindi

छवि स्रोत : मथुरा पुलिस (X) मथुरा में अचानक गिरी पानी की टंकी। मथुरा: जिले…

1 hour ago

मानसून के समय से पहले आने के बावजूद जून में बारिश मासिक औसत से कम रही | मुंबई समाचार – टाइम्स ऑफ इंडिया

मुंबई: मुंबई शहर में जून में सामान्य से कम बारिश हुई, जबकि मानसून जल्दी शुरू…

2 hours ago

आइए सेक्स के बारे में बात करें | समय समाप्त: असुरक्षित सेक्स के 72 घंटे बाद क्या करें – News18

सेक्स हमारी लोकप्रिय संस्कृति में व्याप्त हो सकता है, लेकिन इसके बारे में बातचीत अभी…

3 hours ago