CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets

admin by admin
August 2, 2023
in Information Security


Aug 01, 2023THNCryptocurrency / Malware

Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that’s equipped to fully take over Facebook business accounts as well as siphon cryptocurrency.

Palo Alto Network Unit 42 said it detected the previously undocumented strain as part of a campaign that commenced in December 2022.

NodeStealer was first exposed by Meta in May 2023, describing it as a stealer capable of harvesting cookies and passwords from web browsers to compromise Facebook, Gmail, and Outlook accounts. While the prior samples were written in JavaScript, the latest versions are coded in Python.

“NodeStealer poses great risk for both individuals and organizations,” Unit 42 researcher Lior Rochberger said. “Besides the direct impact on Facebook business accounts, which is mainly financial, the malware also steals credentials from browsers, which can be used for further attacks.”

The attacks start with bogus messages on Facebook that purportedly claim to offer free “professional” budget tracking Microsoft Excel and Google Sheets templates, tricking victims to download a ZIP archive file hosted on Google Drive.

Cybersecurity

The ZIP file embeds within it the stealer executable that, besides capturing Facebook business account information, is designed to download additional malware such as BitRAT and XWorm in the form of ZIP files, disable Microsoft Defender Antivirus, and carry out crypto theft by using MetaMask credentials from Google Chrome, Cốc Cốc, and Brave web browsers.

The downloads are accomplished by means of a User Account Control (UAC) bypass technique that employs the fodhelper.exe to execute PowerShell scripts that retrieve the ZIP files from a remote server.

It’s worth noting that the FodHelper UAC bypass method has also been adopted by financially motivated threat actors behind the Casbaneiro banking malware to obtain elevated privileges over infected hosts.

Unit 42 said it further spotted an upgraded Python variant of NodeStealer that goes beyond credential and crypto theft by implementing anti-analysis features, parsing emails from Microsoft Outlook, and even attempting to take over the associated Facebook account.

Once the necessary information is collected, the files are exfiltrated through the Telegram API, after which they are deleted from the machine to erase the trail.

Cybersecurity

NodeStealer also joins the likes of malware like Ducktail that are part of a growing trend of Vietnamese threat actors looking to break into Facebook business accounts for advertising fraud and propagating malware to other users on the social media platform.

NodeStealer

The development comes as threat actors have been observed leveraging WebDAV servers to deploy BATLOADER, which is then used to distribute XWorm as part of a multi-stage phishing attack.

“Facebook business account owners are encouraged to use strong passwords and enable multi-factor authentication,” Rochberger said. “Take the time to provide education for your organization on phishing tactics, especially modern, targeted approaches that play off current events, business needs and other appealing topics.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

How to Receive Alerts When Your IAM Configuration Changes

Next Post

Are my apps spying on me? A paranoid’s guide to digital life

Related Posts

Information Security

Manage AWS Security Hub using CloudFormation

by admin
September 30, 2023
Information Security

Is that how it works? Hacking and scamming in popular TV shows

by admin
September 30, 2023
Information Security

Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts

by admin
September 29, 2023
Information Security

Get the full benefits of IMDSv2 and disable IMDSv1 across your AWS infrastructure

by admin
September 29, 2023
Information Security

Google Releases Patch for Actively Exploited Zero-Day Vulnerability

by admin
September 28, 2023
Next Post

Are my apps spying on me? A paranoid’s guide to digital life

Recommended

Manage AWS Security Hub using CloudFormation

September 30, 2023

Is that how it works? Hacking and scamming in popular TV shows

September 30, 2023

InnovationBreakthrough Introduction:Chapter 3 Business Model Innovation ~ Future of CIO

September 29, 2023

Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts

September 29, 2023

Get the full benefits of IMDSv2 and disable IMDSv1 across your AWS infrastructure

September 29, 2023

Google Releases Patch for Actively Exploited Zero-Day Vulnerability

September 28, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.