• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
nodestealer malware now targets facebook business accounts on multiple browsers

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers

You are here: Home / General Cyber Security News / NodeStealer Malware Now Targets Facebook Business Accounts on Multiple Browsers
September 15, 2023

An ongoing marketing campaign is focusing on Fb Company accounts with bogus messages to harvest victims’ credentials utilizing a variant of the Python-primarily based NodeStealer and likely acquire more than their accounts for adhere to-on malicious things to do.

“The attacks are achieving victims predominantly in Southern Europe and North The usa across diverse segments, led by the producing expert services and technology sectors,” Netskope Risk Labs researcher Jan Michael explained in an analysis posted Thursday.

Initial documented by Meta in Could 2023, NodeStealer originated as a JavaScript malware capable of pilfering cookies and passwords from web browsers to compromise Fb, Gmail, and Outlook accounts.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Palo Alto Networks Device 42, last thirty day period, unveiled a individual attack wave that took place in December 2022 using a Python edition of the malware, with find iterations also built to conduct cryptocurrency theft.

The most up-to-date conclusions from Netskope advise the Vietnamese danger actors behind the procedure have probable resumed their attack efforts, not to mention undertake practices employed by other adversaries working out of the nation with the very same objectives.

Just earlier this 7 days, Guardio Labs disclosed how fraudulent messages sent through Fb Messenger from a botnet of faux and hijacked personal accounts are remaining leveraged to supply ZIP or RAR archive data files to produce the stealer malware to unsuspecting recipients.

The identical modus operandi functions as the original vector for the NodeStealer intrusion chains to distribute RAR data files hosted on Facebook’s written content delivery network (CDN).

“Pictures of defective products were utilized as bait to convince entrepreneurs or admins of Fb company webpages to down load the malware payload,” Michael explained.

Impending WEBINARIdentity is the New Endpoint: Mastering SaaS Security in the Modern-day Age

Dive deep into the potential of SaaS security with Maor Bin, CEO of Adaptive Protect. Learn why identification is the new endpoint. Secure your spot now.

Supercharge Your Techniques

These archives appear fitted with a batch script that, when executed, opens the Chrome web browser and will take the victim to a benign web site. But in the background, a PowerShell command is run to retrieve added payloads, together with the Python interpreter and the NodeStealer malware.

The stealer, in addition to capturing credentials and cookies – irrespective of whether or not it is from Fb or not – from a variety of web browsers, is made to gather process metadata and exfiltrate the facts more than Telegram.

“When compared to earlier variants, the new NodeStealer variant employs batch files to down load and run Python scripts, and steal credentials and cookies from multiple browsers and for many websites,” Michael reported.

“This campaign may possibly be a doorway to a additional specific attack afterwards on considering the fact that they have by now collected helpful information and facts. Attackers who have stolen Facebook cookies and qualifications can use them to take more than the account, make fraudulent transactions leveraging the legit enterprise site.”

Identified this article attention-grabbing? Abide by us on Twitter  and LinkedIn to read much more exceptional articles we post.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «ddos 2.0: iot sparks new ddos alert DDoS 2.0: IoT Sparks New DDoS Alert
Next Post: Google Agrees to $93 Million Settlement in California’s Location-Privacy Lawsuit google agrees to $93 million settlement in california's location privacy lawsuit»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.