Rising Threat of Malvertising: Understanding Fake Browser Extensions
Growing Cybersecurity Concerns
Recently, cybersecurity experts have unveiled details about two alarming campaigns harnessing malicious ads and counterfeit websites to distribute fake browser extensions. These scams aim to capture sensitive user information, highlighting the ongoing battle against cyber threats in the digital landscape.
Malicious "Meta Verified" Extensions
According to warnings from Bitdefender, one primary campaign promotes a fraudulent browser extension named SocialMetrics Pro. This extension purports to unlock the coveted blue check mark for Facebook and Instagram users, enticing potential victims with the promise of social media validation. So far, investigators have detected at least 37 different malicious advertisements pushing this extension.
How the Scam Operates
The deceptive ads often come with a video tutorial, guiding viewers on how to download and install the extension. This tutorial makes the process appear legitimate while the actual tool, hosted on a recognized cloud service called Box, is designed to harvest session cookies from Facebook. Once collected, this information is sent to a Telegram bot controlled by the cybercriminals. Furthermore, the extension can obtain the victim’s IP address, aiding in the attackers’ reach.
Exploiting the Facebook Graph API
The sophistication of this scam is evident in how certain versions of the rogue extension utilize stolen cookies to interact with the Facebook Graph API. This access allows them to fetch additional data linked to the compromised accounts. Past cases involving malware, such as NodeStealer, demonstrate how these tactics have been employed to harvest sensitive budget information from Facebook accounts.
Criminal Motives
The overarching objective of these malicious operations is to monetize stolen accounts. Criminals aim to sell compromised Facebook Business and Ads accounts on underground forums or leverage them for further malvertising endeavors. This not only enriches the perpetrators but also contributes to an ongoing cycle of account hijacking.
Cultural Insights on Threat Actors
The characteristics of this campaign align with the known behaviors of Vietnamese-speaking cybercriminals, who utilize various stealing families to target Facebook accounts. This theory is further supported by the Vietnamese narration in the tutorial videos and corresponding comments in the source code.
The Industrialization of Malvertising
Bitdefender points out that the use of trusted platforms enables these attackers to generate and disseminate their malicious links at scale. The ability to create comprehensive tutorials and refresh their campaigns continuously is indicative of a broader trend of industrialized malvertising, where attackers streamline every aspect of their operations.
Targeting Meta Advertisers with Rogue Extensions
Another disturbing campaign seeks to deceive Meta advertisers with bogus Chrome extensions masquerading as artificial intelligence (AI) tools for ad optimization. The central figure in this operation is a fraudulent platform named Madgicx Plus, marketed as a way to enhance campaign management and increase return on investment (ROI) through AI capabilities.
The Dual Nature of the Extensions
Though these extensions promise productivity enhancements, they are actually dual-purpose malware designed to hijack business sessions and steal login credentials. As noted by Cybereason, the malicious add-ons can potentially compromise Meta Business accounts.
Risk Assessment for Users
Once installed, these extensions gain unrestricted access to all websites visited by the user. This allows cybercriminals to inject arbitrary scripts, intercept and manipulate network traffic, and monitor user activity. Additionally, users are often prompted to link their Facebook and Google accounts under the guise of accessing the service, unwittingly facilitating the background collection of their identity information.
The Threat Escalation Strategy
The approach taken by these threat actors reveals a calculated strategy aimed at capturing identity information from Google before pivoting to Facebook. This method increases their chances of gaining access to valuable business or advertising assets, thereby amplifying the risk landscape for users and businesses alike.
Conclusion
These developments serve as a timely reminder about staying vigilant in the face of rising cyber threats. Understanding the intricacies of these tactics is crucial for users and organizations looking to protect their sensitive information from falling into the hands of malicious actors.


