NodeStealer, initially identified as a JavaScript-based malware, has transformed into a more advanced Python-based variant, posing a serious threat to Facebook Ads Manager accounts and sensitive business data. This malware not only steals login credentials but also harvests financial information, credit card details, and browser data, leveraging sophisticated techniques to evade detection.
The infection begins with a spear-phishing email disguised as a copyright infringement notice sent from compromised Gmail accounts. Recipients are enticed to click on a malicious link embedded in a seemingly legitimate PDF file. Once accessed, the link downloads a zipped archive containing multiple files, including DLLs and executable scripts. These files initiate a stealthy malware installation process, leveraging DLL sideloading and encoded PowerShell commands to evade antivirus detection.
Once deployed, the malware executes a series of obfuscated Python scripts. These scripts decrypt and launch second-stage payloads designed to steal sensitive information and maintain persistence on the infected system. NodeStealer specifically targets Facebook Ads Manager accounts, extracting financial and business-related data. The stolen data is then exfiltrated to private Telegram channels using a dedicated bot API, ensuring the attackers maintain control over the compromised accounts.
To counter this growing threat, cybersecurity experts recommend implementing robust email filtering systems to detect phishing attempts, educating employees about phishing tactics, and conducting regular system scans to identify and remove malware. Organizations are also encouraged to monitor network activity for unusual behavior and enforce strong access controls on sensitive accounts, such as Facebook Ads Manager, to reduce the risk of compromise.
Reference: