Beware: Fake Madgicx Plus and SocialMetrics Extensions Hijacking Meta Business Accounts

Published:

spot_img

Rising Threat of Malvertising: Understanding Fake Browser Extensions

Growing Cybersecurity Concerns

Recently, cybersecurity experts have unveiled details about two alarming campaigns harnessing malicious ads and counterfeit websites to distribute fake browser extensions. These scams aim to capture sensitive user information, highlighting the ongoing battle against cyber threats in the digital landscape.

Malicious "Meta Verified" Extensions

According to warnings from Bitdefender, one primary campaign promotes a fraudulent browser extension named SocialMetrics Pro. This extension purports to unlock the coveted blue check mark for Facebook and Instagram users, enticing potential victims with the promise of social media validation. So far, investigators have detected at least 37 different malicious advertisements pushing this extension.

How the Scam Operates

The deceptive ads often come with a video tutorial, guiding viewers on how to download and install the extension. This tutorial makes the process appear legitimate while the actual tool, hosted on a recognized cloud service called Box, is designed to harvest session cookies from Facebook. Once collected, this information is sent to a Telegram bot controlled by the cybercriminals. Furthermore, the extension can obtain the victim’s IP address, aiding in the attackers’ reach.

Exploiting the Facebook Graph API

The sophistication of this scam is evident in how certain versions of the rogue extension utilize stolen cookies to interact with the Facebook Graph API. This access allows them to fetch additional data linked to the compromised accounts. Past cases involving malware, such as NodeStealer, demonstrate how these tactics have been employed to harvest sensitive budget information from Facebook accounts.

Criminal Motives

The overarching objective of these malicious operations is to monetize stolen accounts. Criminals aim to sell compromised Facebook Business and Ads accounts on underground forums or leverage them for further malvertising endeavors. This not only enriches the perpetrators but also contributes to an ongoing cycle of account hijacking.

Cultural Insights on Threat Actors

The characteristics of this campaign align with the known behaviors of Vietnamese-speaking cybercriminals, who utilize various stealing families to target Facebook accounts. This theory is further supported by the Vietnamese narration in the tutorial videos and corresponding comments in the source code.

The Industrialization of Malvertising

Bitdefender points out that the use of trusted platforms enables these attackers to generate and disseminate their malicious links at scale. The ability to create comprehensive tutorials and refresh their campaigns continuously is indicative of a broader trend of industrialized malvertising, where attackers streamline every aspect of their operations.

Targeting Meta Advertisers with Rogue Extensions

Another disturbing campaign seeks to deceive Meta advertisers with bogus Chrome extensions masquerading as artificial intelligence (AI) tools for ad optimization. The central figure in this operation is a fraudulent platform named Madgicx Plus, marketed as a way to enhance campaign management and increase return on investment (ROI) through AI capabilities.

The Dual Nature of the Extensions

Though these extensions promise productivity enhancements, they are actually dual-purpose malware designed to hijack business sessions and steal login credentials. As noted by Cybereason, the malicious add-ons can potentially compromise Meta Business accounts.

Risk Assessment for Users

Once installed, these extensions gain unrestricted access to all websites visited by the user. This allows cybercriminals to inject arbitrary scripts, intercept and manipulate network traffic, and monitor user activity. Additionally, users are often prompted to link their Facebook and Google accounts under the guise of accessing the service, unwittingly facilitating the background collection of their identity information.

The Threat Escalation Strategy

The approach taken by these threat actors reveals a calculated strategy aimed at capturing identity information from Google before pivoting to Facebook. This method increases their chances of gaining access to valuable business or advertising assets, thereby amplifying the risk landscape for users and businesses alike.

Conclusion

These developments serve as a timely reminder about staying vigilant in the face of rising cyber threats. Understanding the intricacies of these tactics is crucial for users and organizations looking to protect their sensitive information from falling into the hands of malicious actors.

spot_img

Related articles

Recent articles

Lenovo Advances Regional Strategy with Opening of META Headquarters in Riyadh, Supporting Saudi Arabia’s Vision 2030

Lenovo Advances Regional Strategy with Opening of META Headquarters in Riyadh, Supporting Saudi Arabia's Vision 2030 Lenovo has officially inaugurated its Middle East, Türkiye, and...

Bank Alerts Customers: 97% of Exposed SSNs on Dark Web Face Identity Theft Risks—Here’s How to Protect Yourself

Bank Alerts Customers: 97% of Exposed SSNs on Dark Web Face Identity Theft Risks—Here’s How to Protect Yourself A recent alert from financial institutions regarding...

Surat Homemaker Loses ₹11.03 Lakh in Elaborate Insurance Fraud; Cyber Police Launch Investigation

Surat Homemaker Loses ₹11.03 Lakh in Elaborate Insurance Fraud; Cyber Police Launch Investigation In a striking incident of cyber fraud, a 62-year-old homemaker from Surat...

CISOs Strengthen Resilience Amid Geopolitical Tensions by Focusing on Identity-Centric Security Fundamentals

CISOs Strengthen Resilience Amid Geopolitical Tensions by Focusing on Identity-Centric Security Fundamentals As geopolitical tensions and operational disruptions reshape the threat landscape in the Middle...