Warning campaign to spread malicious code through 'green tick' pages on Facebook
Back in May, Meta quietly released a security report on the latest malware-based threats targeting users on Facebook. With the emergence of AI and ChatGPT, long-standing malware strains, including Ducktail and NodeStealer, have gradually re-emerged and played a central role in the campaign against Facebook's ad system for distribution. unauthorized malware.
The implementation pattern is not complicated. Hackers will target verified (green ticked) Facebook pages, and rename them to be trusted brands like Facebook, Meta, Google AI, Bard, etc. These rebranded pages with The verified green tick is then used to run ads with links to malware.
The Meta side claims to have disrupted the operation of several strains of malware with the ability to quickly adapt in some attack campaigns. According to a Group-IB report, more than 3,200 pages and profiles on Facebook have been compromised to impersonate tech brands, including recently hot keywords like AI, ChatGPT and Bard. After two months of reduced presence, malware groups continue to wreak havoc on Facebook again with a new attack campaign.
This time, malware advertising activities were distributed by hackers through compromised Facebook pages. International security researchers recently discovered a group of these malicious ads that mimic Google. The ad contains a link to the download page hosted on the Google Sites platform. It includes a direct download link stored on DropBox to a RAR file, which is actually malware with a size of 4.26MB.
In fact, Chrome can detect malware during download and stop it before it can hit the device. However, the problem is that Windows Defender does not detect this software as malicious even when its installer is running on the system.
The screenshot below shows one of the malware websites hosted on site.google.com.
To limit users' exposure to malware and raise awareness, Facebook has added a "Page transparency" section to all pages to show history of name changes, country origin, and other details of the site The two recently hacked sites "গাছগাছালি" on July 19 and "SONAX Bangladesh" on July 27 were both renamed to AI Marketing.
At the moment, these pages are still active, the link to the malware is still available and is being hosted on DropBox. You should be wary of instant downloads with seemingly verified pages on Facebook. If you're unsure of the site's identity, you can navigate to the site's About section for details on the site's history and any past name changes.
You should read it
- What is Safe Malware? Why is it so dangerous?
- Instructions on how to remove multi-platform malware on Facebook Messenger
- Analyze Malware actions
- How many types of malware do you know and how to prevent them?
- How to fix Facebook catch virus scan, tell the computer to be infected with malware
- 10 typical malware types
- A new kind of malware is spreading through Messenger and Skype spam messages
- Can a VPN Fight Malware?
- 3 'Scanners' for viruses and malware for Facebook
- What is Malware? What kind of attack is Malware?
- The 4 most common ways to spread malware today
- Learn about polymorphic malware and super polymorphism
Maybe you are interested
This Simple Android App Proves Anything Can Contain Malware
BadBox Malware Is Picking Up Speed, Targeting Certain Android Devices
Warning of new dangerous malware attack campaign targeting Linux
Downloaded malware? Try these fixes before factory reset!
SteelFox Trojan: Malware Turns PCs Into Cryptocurrency Mining Zombies
Remcos Alert: Ingenious Excel Phishing Campaign Spreading Dangerous Fileless Malware