Cybersecurity researchers have discovered a Python variant of NodeStealer, a potent stealer malware, capable of seizing control of Facebook business accounts and siphoning cryptocurrency. The previously undocumented strain was detected as part of a campaign that started in December 2022.
Initially exposed by Meta in May 2023, NodeStealer was known for harvesting cookies and passwords from web browsers to compromise Facebook, Gmail, and Outlook accounts, but the latest versions are coded in Python, making them even more formidable.
Unit 42, Palo Alto Network’s cybersecurity division, warns that NodeStealer poses significant risks to both individuals and organizations. Beyond the direct financial impact on Facebook business accounts, the malware also steals credentials from browsers, enabling further malicious activities. The attacks begin with fake messages on Facebook offering “professional” budget tracking templates, leading victims to download a ZIP archive file hosted on Google Drive.
The ZIP file contains the stealer executable, which not only captures Facebook business account information but also downloads additional malware like BitRAT and XWorm.
To further facilitate its intrusion, NodeStealer employs a User Account Control (UAC) bypass technique using the fodhelper.exe to execute PowerShell scripts and retrieve ZIP files from a remote server. It’s worth noting that the FodHelper UAC bypass method has been previously utilized by threat actors behind the Casbaneiro banking malware.
Unit 42 has also identified an upgraded Python variant of NodeStealer that goes beyond credential and crypto theft by incorporating anti-analysis features and parsing emails from Microsoft Outlook. Additionally, the malware attempts to take over the associated Facebook account. After collecting the required information, the files are exfiltrated through the Telegram API, and subsequently deleted from the infected machine to cover its tracks.
NodeStealer is part of a growing trend of Vietnamese threat actors targeting Facebook business accounts for advertising fraud and spreading malware to other users on the platform. To safeguard against such attacks, Facebook business account owners are encouraged to use strong passwords and enable multi-factor authentication.