• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
nodestealer malware hijacking facebook business accounts for malicious ads

NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads

You are here: Home / General Cyber Security News / NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads
November 3, 2023

Compromised Facebook business enterprise accounts are remaining utilised to run bogus adverts that employ “revealing shots of young girls” as lures to trick victims into downloading an up to date model of a malware known as NodeStealer.

“Clicking on adverts immediately downloads an archive made up of a malicious .exe ‘Photo Album’ file which also drops a next executable penned in .NET – this payload is in cost of stealing browser cookies and passwords,” Bitdefender stated in a report published this 7 days.

NodeStealer was 1st disclosed by Meta in May well 2023 as a JavaScript malware intended to aid the takeover of Fb accounts. Due to the fact then, the menace actors driving the operation have leveraged a Python-based mostly variant in their attacks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The malware is part of a burgeoning cybercrime ecosystem in Vietnam, exactly where a number of risk actors are leveraging overlapping approaches that principally contain marketing-as-a-vector on Fb for propagation.

Cybersecurity

The newest marketing campaign identified by the Romanian cybersecurity business is no unique in that destructive adverts are applied as a conduit to compromise users’ Fb accounts.

“Meta’s Ads Manager instrument is actively exploited in these strategies to goal male end users on Facebook, aged 18 to 65 from Europe, Africa, and the Caribbean,” Bitdefender stated. “The most impacted demographic is 45+ males.”

In addition to distributing the malware by using Windows executable data files disguised as picture albums, the attacks have expanded their focusing on to incorporate frequent Fb people. The executables are hosted on reputable.

The supreme goal of the attacks is to leverage the stolen cookies to bypass security mechanisms like two-factor authentication and change the passwords, proficiently locking victims out of their have accounts.

“No matter whether thieving money or scamming new victims via hijacked accounts, this type of destructive attack lets cybercrooks to continue to be below the radar by sneaking earlier Meta’s security defenses,” the researchers claimed.

Before this August, HUMAN disclosed an additional variety of account takeover attack dubbed Capra aimed at betting platforms by utilizing stolen email addresses to determine registered addresses and sign in to the accounts.

Cybersecurity

The development will come as Cisco Talos thorough many cons that goal customers of the Roblox gaming system with phishing inbound links that aim to seize victims’ credentials and steal Robux, an in-app forex that can be used to buy updates for their avatars or purchase unique qualities in encounters.

“‘Roblox’ end users can be focused by scammers (recognized as ‘beamers’ by ‘Roblox’ players) who try to steal valuable merchandise or Robux from other gamers,” security researcher Tiago Pereira claimed.

“This can occasionally be produced much easier for the scammers simply because of “Roblox’s” younger person foundation. Approximately fifty percent of the game’s 65 million end users are underneath the age of 13 who may possibly not be as adept at recognizing frauds.”

It also follows CloudSEK’s discovery of a two-12 months-extensive knowledge harvesting marketing campaign happening in the Middle East through a network of about 3,500 bogus domains connected to true estate properties in the area with the objective of gathering details about buyers and sellers, and peddling the info on underground boards.

Identified this posting appealing? Observe us on Twitter  and LinkedIn to read a lot more exclusive material we publish.


Some areas of this posting are sourced from:
thehackernews.com

Previous Post: «predictive ai in cybersecurity: outcomes demonstrate all ai is not Predictive AI in Cybersecurity: Outcomes Demonstrate All AI is Not Created Equally
Next Post: Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments kinsing actors exploiting recent linux flaw to breach cloud environments»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.