The Vietnamese threat group associated with the Ducktail stealer malware has initiated a new campaign targeting marketing professionals in India, spanning from March to early October 2023. In a shift from their typical use of .NET applications, the attackers employed Delphi as the programming language for this campaign.
Furthermore, the objective was to hijack Facebook business accounts, primarily focusing on users who have access to such accounts. The cybercriminals propagated malicious ads through sponsored ads on Facebook, deploying malware designed to pilfer victims’ login cookies and gain control over their accounts. The attackers utilized the unauthorized access to place advertisements, further perpetuating the infections.
Kaspersky, the Russian cybersecurity firm, documented the campaign and highlighted its distinctive features. The attackers sent potential targets archive files containing a malicious executable, cleverly disguised with a PDF icon to deceive victims into launching the binary. Once executed, the malicious file saved a PowerShell script and a decoy PDF document locally. The script then used the default PDF viewer on the device, paused for five minutes, and terminated the Chrome browser process.
Additionally, the parent executable downloaded and launched a rogue library named libEGL.dll, scanning specific folders for shortcuts to Chromium-based web browsers. The overarching strategy of the threat actors involved leveraging the compromised Facebook accounts to place unauthorized ads for financial gains.
By focusing on marketing professionals, the attackers sought individuals with access to Facebook Business accounts, providing them a platform for spreading malicious content. The use of sponsored ads on Facebook was a key element in the distribution of the malware. Kaspersky’s report underscores the evolving tactics of cybercriminals, emphasizing the importance of vigilance and advanced security measures to counter such threats.
Reference: