Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hreflang-tags-pro domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6121
[www-stage.newsbtc.com/news/ai-and-tech/cryptocurrency-targeting-malware-spreads-via-facebook-messenger/amp/]
[wp-includes/functions.php:6121 trigger_error(), wp-includes/functions.php:6061 wp_trigger_error(), wp-includes/l10n.php:1371 _doing_it_wrong(), wp-includes/l10n.php:1409 _load_textdomain_just_in_time(), wp-includes/l10n.php:195 get_translations_for_domain(), wp-includes/l10n.php:307 translate(), wp-content/plugins/hreflang-tags-for-wordpress/includes/variables.php:24 __(), wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro-main.php:45 include_once('wp-content/plugins/hreflang-tags-for-wordpress/includes/variables.php'), wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro.php:40 require_once('wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro-main.php'), wp-settings.php:545 include_once('wp-content/plugins/hreflang-tags-for-wordpress/hreflang-tags-pro.php'), wp-config.php:53 require_once('wp-settings.php'), wp-load.php:50 require_once('wp-config.php'), wp-blog-header.php:13 require_once('wp-load.php'), index.php:17 require('wp-blog-header.php')]

Cryptocurrency-Targeting Malware Spreads via Facebook Messenger

Cryptocurrency-Targeting Malware Spreads via Facebook Messenger

Malware

A malicious Chrome extension discovered by Kaspersky Labs in August 2017 which targets cryptocurrency trading platforms has resurfaced with a spike in April 2018. The malware reportedly made attempts in a number of countries including Japan and South Korea.

Malicious Chrome Extension Spreads Via Facebook Messenger to Target Cryptocurrency Trading Platforms

In August 2017, Kaspersky Labs researcher David Jacoby found an advanced form of malware which used Facebook Messenger to infect victims’ systems. It did this by displaying a fake error message in a redirected website that tricked users to download a malicious Google Chrome extension from the Google Web Store. TrendLabs has found the same malware again in April 2018 after a spike in reports in Germany, Tunisia, Japan, Taiwan, South Korea, and Spain.

Named FacexWorm by the TrendLabs team, the malicious extension lists and sends socially engineered links to the friends of an affected Facebook account and is capable of stealing accounts and credentials of its websites of interest, mostly cryptocurrency trading platforms. FacexWorm is a clone of a normal Chrome extension but injected with shortcode containing its main routine. It redirects victims to cryptocurrency scams with malicious mining codes on the webpage and hijacks transactions by replacing the recipient address with the attacker’s in trading platforms and web wallets.

FacexWorm propagates through Facebook Messenger as it redirects to a fake YouTube page that asks users to install a codec extension in order to play the video, which then requests privileged access. The granted permission leads to a stream of downloads of additional malicious codes from its command-and-control (C&C) server and Facebook in order to further spread the malware through the account’s friend list. If users are using browsers other than Chrome’s desktop version, the malware link diverts to a random advertisement.

The malware steals the victim’s account credentials for Google, MyMonero, and Coinhive, and redirects the user to a scam webpage if the browser accesses one of the 52 cryptocurrency trading platforms it targets or if searches for cryptocurrency-related keywords. The scam asks the user to send 0.5 – 10 ether (ETH) to the attacker’s wallet address for verification purposes and promises to send back 5 – 100 ETH.

FacexWorm also attacks the user’s computer for malicious web cryptocurrency mining, as it utilizes 20 percent of CPU power for each thread and opens four threads to mining on web pages. Moreover, the victim is vulnerable to cryptocurrency transaction hijacking as the malware locates the address keyed in by the victim and replaces it with another specified by the attacker. FacexWorm also earns money through cryptocurrency-related referral programs and it has redirected users to a number of websites, including Binance, DigitalOcean, FreeBitco.in, FreeDoge.co.in, and HashFlare.

Image from Shutterstock.
Exit mobile version