Hacked: Hacking Finance

Cybersecurity

Phishing Malware Claims 10,000 Facebook Victims

Posted on .

Phishing Malware Claims 10,000 Facebook Victims

Introduction

A recently uncovered malware attack targeting Facebook users has claimed nearly 10,000 victims in just under two days, with countries in South America and Europe among the hardest hit.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

Between 24 and 27 June, thousands of Facebook users were targeted by phishing messages purporting to come from a “friend”, claiming to have mentioned the targeted users on Facebook. However, the message had in fact been initiated by attackers instigating a two-stage attack.

The malware was uncovered by a security researcher at Kaspersky Lab, pointing to a two-stage malware that includes a Trojan.

The first stage sees the Trojan downloaded onto a target’s computer, along with a malicious Chrome browser extension among other harmful malware. The second, sees the extension and the Trojan enabled, thereby taking over the target’s Facebook account after the victim logs into the social network using the compromised Chrome browser.

The two day phishing spree was observed by Kaspersky, who noted nearly 10,000 infection attempts around the world. The countries most affected, by order of malware distribution from highest were Brazil, Poland, Peru, Colombia, Mexico, Ecuador, Greece, Portugal, Tunisia, Venezuela, Germany and Israel.

Notably, Windows-based Facebook users were at the highest risk, along with some using Windows OS phones. However, Android and iOS users were immune as the malware used incompatible libraries.

Compromising your Facebook Account

An attack, when successful, gave the attacker comprehensive control over a user’s Facebook account. An attacker gained the means to change privacy settings, steal data and even spread the infection to the victim’s Facebook friends. To safeguard itself, the malware also attempted to black-list access to certain websites through the browser, including the ones belonging to cybersecurity firms.

Ido Naor, a senior security researcher at Kaspersky Lab stated in a blog:

Two aspects of this attack stand out.  Firstly, the delivery of the malware was extremely efficient, reaching thousands of users in only 48 hours.

Secondly, the response from consumers and the media was almost as fast. Their reaction raised awareness of the campaign and drove prompt action and investigation by the providers concerned.

For its part, Facebook has mitigated the threat and is employing effective blocking methods to curb the spread of the malware from infected computers. Furthermore, Google has removed a malicious extension from the Chrome store.

Users are advised to check their Chrome browser to look for rogue, unknown extensions.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

DON'T MISS OUT

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

There are no comments.

View Comments (0) ...
Navigation
 A UK court has granted bail to Lauri Love, an…