Malware Spreads Through Facebook Tag Scam
Intel security has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving using new spreading mechanisms.
A few days ago, we came across a Facebook post with this subject:
[Username] shared a link – with [Another username] and 19 others
This malware uses the following script to get the user id and Facebook DTSG value:
The following malware code randomly selects friends to tag:
The following script selects a random porn image from its control server and displays it to the user:
This scam lures curious Facebook users to the compromised website, which then attempts to trick them into installing malicious browser extensions and other malware to view the adult video. When users visit the link to view the video, the malware prompts them to download a fake Adobe Flash Player update, which in turn downloads the executable servant.exe on the victims’ machines in the %appdata% folder and executes it.
The downloaded payload creates a run registry entry to execute itself every time Windows starts.
The payload also creates the following files on a victim’s machine:
- c:\documents and settings\administrator\application data\microsoft\protect\S-1-5-21-117609710-1801674531-725345543-500\preferred
- c:\documents and settings\administrator\application data\microsoft\protect\s-1-5-21-1844237615-2111687655-839522115-500\4532158e-ef11-42f9-813c-ddbb4f02c848
After successful installation and delivery, the malware modifies victims’ browsers to keep the malware updated and to block users from accessing certain security websites. The malicious browser extension blocks URLs that include any of the following keywords:
While browsing these, victims may see the following error message:
This malware is different from other social media malware in some techniques. Previously this type of malware spread through victims’ chat windows and infected victims’ friends. Once victims’ friends are infected, the malware could go one step further and infect the friends of the initial victims’ friends. The following screen shows how the malware was propagated through chat messages:
In addition to keeping antimalware protection up to date, users should practice safe browsing techniques, such as avoiding unfamiliar links that redirect outside of Facebook, even if those links are shared by a trusted friend.
Intel security detects this malware as BackDoor-FBUS starting with DAT Version 7781.
Post a Comment