SME Times is powered by   
Search News
Just in:   • Sensex surges over 2,100 pts, Nifty above 24,650  • Foreign investors infuse over Rs 14,000 crore into equity in May  • EAM Jaishankar dials counterparts in Asia and Europe, discusses strikes on Pak-based terror camps  • Iran rejects report of proposing direct talks with US  • Singapore issues travel advisory asking citizens to avoid J&K, Pak 
Last updated: 27 Nov, 2023  

Cyber.Crime.9.Thmb.jpg Hackers using new malware to steal Facebook Business accounts: Report

Cyber.Crime.9.jpg
   Top Stories
» Sensex surges over 2,100 pts, Nifty above 24,650
» Foreign investors infuse over Rs 14,000 crore into equity in May
» Sensex, Nifty open nearly flat as geopolitical tensions continue
» Sensex, Nifty gain in early trade as India carries out ‘Operation Sindoor’
» India, UK finalised free trade deal, says PM Modi
IANS | 27 Nov, 2023
Cybersecurity researchers have discovered a new version of malware from the "Ducktail" family to steal Facebook Business accounts, a new report has shown.

According to the cybersecurity company Kaspersky, cybercriminals are using malicious browser extensions to target company employees who either hold fairly senior positions or work in HR, digital marketing, or social media marketing.

"Their ultimate goal is to hijack Facebook Business accounts, so it makes sense that the attackers are interested in folks most likely to have access to them," the researchers said.

Ducktail is a specifically designed information stealer with serious consequences such as privacy violations, financial losses, and identity theft.

To hack users' FB accounts, cybercriminals behind Ducktail send out malicious archives to their potential victims that contain bait in the form of theme-based images and video files on a common topic.

Inside these archives also include executable files, which contain PDF icons and very long file names to divert the victim’s attention from the exe extension.

Additionally, the names of the fake files appeared to be carefully chosen for relevance so as to persuade the recipients to click on them.

In the fashion-themed campaign, the names referred to “guidelines and requirements for candidates”, but other bait like, say, price lists or commercial offers, can be used as well, the report noted.

After first opening the exe file in the hopes that the victim will not notice anything unusual, it displays the contents of a PDF file that the malicious code has embedded in it.

Notably, the malware simultaneously scans all desktop shortcuts, the Start menu, and the Quick Launch toolbar.

According to the report, the malware searches for shortcuts to Chromium-based browsers, such as Google Chrome, Microsoft Edge, Vivaldi, and Brave.

"Having found one, the malware alters its command line by adding an instruction to install a browser extension, which is also embedded in the executable file," said the researchers.

"Five minutes later, the malicious script terminates the browser process, prompting the user to restart it using one of the modified shortcuts," they added.

 
Print the Page
Add to Favorite
 
Share this on :
 

Please comment on this story:
 
Subject :
Message:
(Maximum 1500 characters)  Characters left 1500
Your name:
 

 
  Customs Exchange Rates
Currency Import Export
US Dollar
84.35
82.60
UK Pound
106.35
102.90
Euro
92.50
89.35
Japanese Yen 55.05 53.40
As on 12 Oct, 2024
  Daily Poll
Do you think Indian businesses will be negatively affected by Trump's America First Policy?
 Yes
 No
 Can't Say
  Commented Stories
 
 
About Us  |   Advertise with Us  
  Useful Links  |   Terms and Conditions  |   Disclaimer  |   Contact Us  
Follow Us : Facebook Twitter