Some time ago, an antivirus expert from our Global Research and Analysis Team, David Jacoby, discovered multiplatform malware that was distributed through Facebook Messenger. A few years ago, similar outbreaks were occurring quite often, but none have appeared lately; Facebook was doing a lot to prevent similar attacks.

 

First a preliminary report was published. At that time, Jacoby still had not had enough time to research many details about how the malware operated, but now he has, and we are ready to share them. From a user’s perspective, here’s how the infection progressed.

 

● The user received a message in Facebook Messenger from a friend. The message contained the word “Video,” the name of the sender, a random smiley, and a short link. It might look like this, for example:

 

● The link redirected to Google Drive, where the user saw something resembling a video player with a picture of the original sender in the background and what looked like a Play button.

 

● If the victim attempted to play back the “video” in Google Chrome, they were redirected to a page that looked much like a YouTube page and offered to install an extension for Chrome.

 

● If the user agreed to the installation, then the extension began to send out malicious links to their friends – and everything followed the same algorithm for each of them over again.

 

● Users of other browsers were persistently reminded to update their Adobe Flash Player instead of being offered the extension. The file they downloaded turned out to be adware – essentially, malefactors used advertisements to earn their money.

 

Jacoby, along with Frans Rosen, a researcher with whom he has been working on a project called “Hunting bugs for humanity,” have analyzed this malicious campaign and worked out how it operates.

 

The page that users were redirected to after following the link in Facebook Messenger was basically a PDF file that had been published to Google Drive. It opened as a preview. The file had a picture from a user’s Facebook page – the user whose identity was used to spread the malware – an icon for playing back the video shown over the picture, and the link that the victim opened by trying to click the playback button.

 

Clicking the link led friends of the victim to this page.
The link caused several redirections, landing the user on one of several websites. Victims using browsers other than Google Chrome ended up on a website offering to download adware masked as an update for Adobe Flash Player.

 

Browsers other than Google Chrome offered to download adware disguised as Adobe Flash Player.
In the case of Chrome, that was just the beginning: If the victim agreed to install the extension offered on the landing page, it began monitoring what websites the user opened. As soon as the victim navigated to Facebook, the extension stole their login credentials and the access token and sent them to the malefactors’ server.

A fake YouTube page offering to install Google Chrome extensions.
The crooks had found an interesting bug in Facebook. As it turned out, the unsecure Facebook Query Language (FQL), which was disabled a year ago, was not completely wiped out; it was blocked for applications, but with a few exceptions. For example, Facebook Pages Manager, an iOS application, still uses FQL. Thus, to gain access to the “locked out” feature, malware simply has to act on behalf of the application.

 

By using the stolen credentials and accessing the obsolete Facebook feature, the crooks could request that the social network send them the contact list of the victim, cull those who were not currently online, and randomly select 50 new victims from the remainder. Then, those users were bulk-messaged with a new link to Google Drive with a PDF file preview generated with the picture of the person on whose behalf the new messaging wave commenced. All in all, a vicious cycle.

 

It is worth noting that among other things, the malicious script “liked” a specific Facebook page, apparently to collect statistics for the infection. In the course of the attack, Jacoby and Rosen observed, the malefactors changed several of the specific pages, possibly as Facebook closed the previous ones. Judging by the number of “likes,” there were tens of thousands of victims.

One of the pages that infected users “liked.”
Their analysis of the code revealed that the malefactors were initially planning to use localized messages but then changed their minds and resorted to the short and simple “Video.” The localization function‘s code showed that the crooks were primarily interested in Facebook users from several European countries such as Turkey, Italy, Germany, Portugal, France (also, francophone Canada), Poland, Greece, Sweden, and all countries with English-speaking users.

 

The mutual effort of several companies has put an end to the infection’s spread for now. Nonetheless, this story is a great reminder that extensions for browsers are not as harmless as they may seem. To stay safe and not fall victim to similar malicious campaigns, avoid installing browser extensions without absolute confidence that they are safe, that they will not steal your data, and that they won’t track your online activities.

 

Also, clicking every link, even links that seem to be from someone you know, is out of the question. It is always a good idea to make sure that it is really your friend on the other end of the line, not some criminal who took control of your friend’s account.


RECOMMENDED ARTICLE FOR TECHWORLD


 
BP Waterworks Inc. Invests in Leading Software to Jump-Start Major ERP Transformation
Techworld Date Posted: 2 August 2019 6:19 PM | 139 Views
BP Waterworks Inc. Invests in Leading Software to Jump-Start Major ERP Transformation . See More
 
BP Waterworks Inc. Invests in Leading Software to Jump-Start Major ERP Transformation
Techworld Date Posted: 6:19 PM | 139 Views
BP Waterworks Inc. Invests in Leading Software to Jump-Start Major ERP Transformation See More

 
Reward Yourself This Payday with Nokia Mobile’s Weekend Promos
Techworld Date Posted: 15 March 2019 4:47 PM | 63 Views
HMD Global, the home of Nokia phones, today announced its latest offering for Nokia fans, just in time for the payday weekends this March.. See More
 
Reward Yourself This Payday with Nokia Mobile’s Weekend Promos
Techworld Date Posted: 4:47 PM | 63 Views
HMD Global, the home of Nokia phones, today announced its latest offering for Nokia fans, just in time for the payday weekends this March.See More

PCBG Contributing Writer
Machine Learning AI vs Employee Vigilance
Techworld • By: PCBG Contributing Writer | Date Posted: 1 August 2017 9:43 AM | 80 Views
Here we are again. Man versus machine. On one corner, we have the machine capable of reading huge amounts of data in so little time, and on the other, an employee who knows nothing.... See More
PCBG Contributing Writer
Machine Learning AI vs Employee Vigilance
Techworld • By: PCBG Contributing Writer | Date Posted: 9:43 AM | 80 Views
Here we are again. Man versus machine. On one corner, we have the machine capable of reading huge amounts of data in so little time, and on the other, an employee who knows nothing...See More

 
38% Would Give Up Social Media to Guarantee Lifetime Data Privacy, Kaspersky’s Study Says
Techworld Date Posted: 27 June 2019 11:00 AM | 54 Views
38% Would Give Up Social Media to Guarantee Lifetime Data Privacy, Kaspersky’s Study Says . See More
 
38% Would Give Up Social Media to Guarantee Lifetime Data Privacy, Kaspersky’s Study Says
Techworld Date Posted: 11:00 AM | 54 Views
38% Would Give Up Social Media to Guarantee Lifetime Data Privacy, Kaspersky’s Study Says See More

 
It’s Raining Pies! Nokia 6.1 Plus and Nokia 6.1 Upgrade to Android™ 9 Pie
Techworld Date Posted: 12 November 2018 4:22 PM | 333 Views
Packed with Google’s newest software and building on the features of Android™ 8.0 Oreo™, Android™ 9 Pie features artificial intelligence and machine learning to give owners a more customized and tailored experience.. See More
 
It’s Raining Pies! Nokia 6.1 Plus and Nokia 6.1 Upgrade to Android™ 9 Pie
Techworld Date Posted: 4:22 PM | 333 Views
Packed with Google’s newest software and building on the features of Android™ 8.0 Oreo™, Android™ 9 Pie features artificial intelligence and machine learning to give owners a more customized and tailored experience.See More

 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 9 August 2017 2:55 PM | 386 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President.... See More
 
Shaping the Leaders of Tomorrow
Techworld Date Posted: 2:55 PM | 386 Views
From left: Harriet B. Fernandez, Director, Computing and Information Services Office, Lennie K. Ong, University Treasurer, Edison B. Sasoy, Vice President for Administration, Fr. Roberto C. Yap, SJ, University President, Mr. Cricket Santiago, President...See More

 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 30 March 2017 10:59 AM | 57 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.. See More
 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 10:59 AM | 57 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.See More

 
Innovation Insights Defending Today’s OT Environments
Techworld Date Posted: 22 January 2018 2:27 PM | 46 Views
Operational Technology, or OT, including SCADA (supervisory control and data acquisition) and ICS (industrial control systems), is a system of hardware and software designed to monitor and/or control the physical devices, processes, and events.... See More
 
Innovation Insights Defending Today’s OT Environments
Techworld Date Posted: 2:27 PM | 46 Views
Operational Technology, or OT, including SCADA (supervisory control and data acquisition) and ICS (industrial control systems), is a system of hardware and software designed to monitor and/or control the physical devices, processes, and events...See More

 
The New Smart Watch from PLDT HOME is a Must-have for Kids and Here’s Why
Techworld Date Posted: 18 July 2016 2:19 PM | 109 Views
Are you looking for a useful yet super cool gift for your kid? How about a watch? No, how about a Smart Watch? The Smart Watch from PLDT HOME is the latest, and coolest, gadget for kids,.... See More
 
The New Smart Watch from PLDT HOME is a Must-have for Kids and Here’s Why
Techworld Date Posted: 2:19 PM | 109 Views
Are you looking for a useful yet super cool gift for your kid? How about a watch? No, how about a Smart Watch? The Smart Watch from PLDT HOME is the latest, and coolest, gadget for kids,...See More

Frank Emmanuel Trazo
Adaptability and Stability
Techworld • By: Frank Emmanuel Trazo | Date Posted: 2 August 2017 2:42 PM | 668 Views
California-based multinational computer technology corporation Oracle continues to push on innovating their Security Operation Center (SOC) cloud service, a cloud-native, management, and identity-based platform designed for every company's security systems. Oracle aims to improve.... See More
Frank Emmanuel Trazo
Adaptability and Stability
Techworld • By: Frank Emmanuel Trazo | Date Posted: 2:42 PM | 668 Views
California-based multinational computer technology corporation Oracle continues to push on innovating their Security Operation Center (SOC) cloud service, a cloud-native, management, and identity-based platform designed for every company's security systems. Oracle aims to improve...See More


Power by

Download Free AZ | Free Wordpress Themes