Cybercriminals have launched a sophisticated campaign exploiting Facebook’s advertising platform to distribute their new malware. They aim to steal cryptocurrency wallet credentials from users worldwide through deceptive Pi Network-themed online advertisements. The malicious operation began on June 24, 2025, coinciding with the Pi2Day celebration and has already deployed many ad variations. The campaign’s global scope encompasses the United States, Europe, Australia, and several countries in Asia. This indicates a well-resourced operation with significant international ambitions and a high degree of technical coordination.
The threat actors employ two primary attack vectors in order to compromise their unsuspecting and vulnerable victims. The first attack vector involves phishing pages that meticulously mimic legitimate Pi Wallet interfaces to successfully trick users. These pages prompt users to enter their twenty-four-word recovery phrases under the pretense of claiming free Pi tokens. Once these secret credentials are entered, the attackers gain complete control over the victims’ cryptocurrency wallets. The second attack vector uses malware-embedded applications that are disguised as official Pi Network cryptocurrency mining software. These deceptive installers promise users bonuses for downloading and executing the PC applications on their personal home computers.
The malware’s infection process demonstrates sophisticated engineering that is designed to successfully evade standard cybersecurity detection methods.
Upon initial execution of the program, the malicious payload establishes a strong foothold through various obfuscation techniques. The malware’s architecture incorporates multiple stages, with each component serving a specific function in the overall attack chain. The primary payload focuses on credential harvesting, systematically extracting saved passwords and important authentication tokens from infected systems. The malware also simultaneously deploys keylogging capabilities to capture real-time user input and sensitive financial and personal information. Its persistence mechanisms ensure continued operation even after the victim’s computer system has been rebooted multiple times.
The campaign’s success stems from exploiting users’ inherent trust in verified social media platforms like Meta’s Facebook.
It also preys on their limited understanding of standard cryptocurrency wallet security best practices that are widely recommended. By leveraging Facebook’s advertising legitimacy, threat actors have created a very effective and wide-reaching malware distribution mechanism. This operation also takes advantage of the Pi Network’s growing popularity among cryptocurrency enthusiasts from all around the world. The campaign continues to evolve and adapt to new security countermeasures, presenting a significant challenge for security teams.
Reference: