Malware spreads through crack software specializing in stealing Facebook, Instagram, and Twitter accounts
Social media accounts, especially verified (green tick) accounts, are attractive targets for hackers because they can use hacked accounts for other fraudulent purposes.
These accounts are even more attractive if they have access to the advertising platforms of the social networks. From there, the hacker can use the victim's account and money to run malicious ads.
According to researchers at Zscaler, FFDroider spreads through crackers, fake freeware, cracked games, and other files downloaded from torrent sites.
Once installed, the FFDroider malware will also be installed, but disguised as the Telegram desktop application to avoid detection.
Malware spreads through crack software specializing in stealing Facebook, Instagram, and Twitter accounts Picture 1
Once launched, the malware creates a Windows registry key named FFDroider. Next, it starts collecting cookie data and account credentials stored in Google Chrome, Mozilla Firefox, Internet Explorer, and Microsoft Edge.
Malware spreads through crack software specializing in stealing Facebook, Instagram, and Twitter accounts Picture 2
FFDroider is designed to target social logins and e-commerce sites. The hacker behind this malicious code paid special attention to Facebook, Instagram, Amazon, eBay, Etsy, Twitter accounts and the WAX Cloud wallet access gateway.
After stealing the information and sending it to the command and control server (C2), FFDroider will download new modules. It is not yet known what the new modules will do, but Zscaler predicts they will pose a greater threat.
You should read it
- Why should you think carefully before logging in with a social network account?
- BankBot is back on Play Store - an uninterrupted story about malware on Android
- Modular Malware - New stealth attack method to steal data
- 5 tips to keep your social network account in a 'safe' state
- Detect new Android malware fake system update to track and steal user information
- What is Safe Malware? Why is it so dangerous?
- Instructions for registering an Instagram account on your phone
- Lotus - the 'made in Vietnam' social network has opened an account registration and trial
- What is malware analysis? How are the steps taken?
- Instructions for creating Hahalolo account
- Sneaking malware on the Internet
- Google officially joined the Instagram image social network
May be interested
VMware patches RCE Spring4Shell vulnerability on a wide range of products
GitLab patches critical vulnerability that allows hackers to take control of accounts
New phishing toolkit discovered that makes it easy to create fake Chrome browser windows
Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
Notorious botnet TrickBot stopped working, redirected to another form of malicious code that could be more dangerous
NVIDIA suffered a cyber attack, massive damage estimated