DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Alerts

Facebook Business Accounts at Risk

August 2, 2023
Reading Time: 2 mins read
in Alerts

Cybersecurity researchers have discovered a Python variant of NodeStealer, a potent stealer malware, capable of seizing control of Facebook business accounts and siphoning cryptocurrency. The previously undocumented strain was detected as part of a campaign that started in December 2022.

Initially exposed by Meta in May 2023, NodeStealer was known for harvesting cookies and passwords from web browsers to compromise Facebook, Gmail, and Outlook accounts, but the latest versions are coded in Python, making them even more formidable.

Unit 42, Palo Alto Network’s cybersecurity division, warns that NodeStealer poses significant risks to both individuals and organizations. Beyond the direct financial impact on Facebook business accounts, the malware also steals credentials from browsers, enabling further malicious activities. The attacks begin with fake messages on Facebook offering “professional” budget tracking templates, leading victims to download a ZIP archive file hosted on Google Drive.

The ZIP file contains the stealer executable, which not only captures Facebook business account information but also downloads additional malware like BitRAT and XWorm.

To further facilitate its intrusion, NodeStealer employs a User Account Control (UAC) bypass technique using the fodhelper.exe to execute PowerShell scripts and retrieve ZIP files from a remote server. It’s worth noting that the FodHelper UAC bypass method has been previously utilized by threat actors behind the Casbaneiro banking malware.

Unit 42 has also identified an upgraded Python variant of NodeStealer that goes beyond credential and crypto theft by incorporating anti-analysis features and parsing emails from Microsoft Outlook. Additionally, the malware attempts to take over the associated Facebook account. After collecting the required information, the files are exfiltrated through the Telegram API, and subsequently deleted from the infected machine to cover its tracks.

NodeStealer is part of a growing trend of Vietnamese threat actors targeting Facebook business accounts for advertising fraud and spreading malware to other users on the platform. To safeguard against such attacks, Facebook business account owners are encouraged to use strong passwords and enable multi-factor authentication.

Source:
  • NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts
Tags: AlertsAlerts 2023August 2023CryptocurrenciesCyberattackCybersecurityFacebookMalwareNodeStealerPasswordsPython
22
VIEWS
ADVERTISEMENT

Related Posts

Evolving Threat of BunnyLoader

Evolving Threat of BunnyLoader

October 2, 2023
ASMCrypt Unveils a New Malware Loader Threat

ASMCrypt Unveils a New Malware Loader Threat

October 2, 2023
FBI Warns of Dual Ransomware Threat

FBI Warns of Dual Ransomware Threat

October 2, 2023
Bing Chatbots Vulnerable to Malware

Bing Chatbots Vulnerable to Malware

October 2, 2023

More Articles

Incidents

IT Services Provider Hit by Donut Gang

September 22, 2023
Incidents

Ransomware Group LostTrust’s Rapid Attacks

September 28, 2023
Incidents

APT IRAN Claims 4TB Data Access

September 28, 2023
Incidents

Baruch College Malware Incident Update

September 29, 2023

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.