Facebook’s security team has discovered a new malware, named ‘NodeStealer,’ that allows cybercriminals to steal browser cookies to hijack accounts on the platform, Gmail, and Outlook. The malware was first spotted in late January 2023 and attributed to Vietnamese threat actors. It is a 46-51MB Windows executable disguised as a PDF or Excel document that establishes persistence on the victim’s machine between reboots.
NodeStealer uses Node.js, which makes it capable of running on Windows, macOS, and Linux, and difficult to detect, with almost all AV engines on VirusTotal failing to mark it as malicious at the time.
Furthermore, the malware’s primary objective is to steal cookies and account credentials for Facebook, Gmail, and Outlook stored in Chromium-based web browsers like Google Chrome, Microsoft Edge, Brave, and Opera. NodeStealer scans specific file paths for valuable data, which is normally encrypted on the browsers’ SQLite database.
If NodeStealer finds cookies or credentials related to Facebook accounts, it abuses Facebook API to extract information about the breached account. To evade detection by Facebook’s anti-abuse systems, NodeStealer hides these requests behind the victim’s IP address and uses their cookie values and system configuration to appear like a genuine user.
At the same time, the malware’s key target is the Facebook account’s ability to run advertising campaigns, which threat actors leverage for pushing misinformation or leading unsuspecting audiences to other malware distribution sites. NodeStealer exfiltrates the stolen data to the attacker’s server.
Upon discovery, Facebook reported the threat actor’s server to the domain registrar, and it was taken down on January 25, 2023. Facebook has shared its data on Facebook’s public GitHub repository for those interested in IOCs related to NodeStealer, DuckTail, and malware imitating ChatGPT, as Facebook also shared information on continuing DuckTail malware operations and malware and malicious extensions distributed as ChatGPT programs in its latest malware threat report.
Capturing cookies containing valid user session tokens is growing in popularity among cybercriminals, as it allows them to hijack accounts without having to steal credentials or interact with the target, while also bypassing two-factor authentication protections.
Cybercriminals using this tactic is a growing concern, and organizations must take steps to prevent these types of attacks, such as implementing multi-factor authentication, using encryption, and regularly educating employees on phishing tactics.