• About Us
  • Privacy
  • Terms
    • DMCA
  • AdChoices
  • Contact Us
  • Careers
  • Dictionary
  • Donate
No Result
View All Result
Nyongesa Sande
  • Radio
  • Events
  • How To
  • AI
  • Business
    • Shop
    • Money
    • Billionaires
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos
Nyongesa Sande
No Result
View All Result
  • Radio
  • Events
  • How To
  • AI
  • Business
  • Finance
  • Gadgets
  • Lifestyle
  • Sports
  • Autos

Home » Malware that steals Facebook accounts

Malware that steals Facebook accounts

December 12, 2023
in Cybersecurity
Reading Time: 3 mins read
A A
FacebookXTelegramWhatsappLinkedIn

Our researchers have discovered a new version of malware from the Ducktail family. Cybercriminals are using it to target company employees who either hold fairly senior positions or work in HR, digital marketing, or social-media marketing. Their ultimate goal is to hijack Facebook Business accounts, so it makes sense that the attackers are interested in folks most likely to have access to them. Today, we talk about how attacks occur, what’s unusual about them and, of course, how to protect yourself.

ADVERTISEMENT

Bait and malicious payload

What the cybercriminals behind Ducktail do is send out malicious archive to their potential victims. To lull the recipient’s vigilance, the archives contain bait in the form of theme-based images and video files on a common topic. For example, the theme of the most recent campaign (March to early October 2023) was fashion: emails were sent out in the name of big fashion industry players with archives containing photos of items of clothing.

However, inside these archives were also executable files. These files had PDF icons and very long file names to divert the victim’s attention from the EXE extension. Additionally, the names of the fake files appeared to be carefully chosen for relevance so as to persuade the recipients to click on them. In the fashion-themed campaign, the names referred to “guidelines and requirements for candidates”, but other bait like, say, price lists or commercial offers, can be used as well.

After clicking the disguised EXE file, a malicious script runs on the target device. Firstly, it does indeed display the contents of some PDF file embedded in the malware code, with the hope that the victim doesn’t smell a rat. At the same time, the malware scans all the shortcuts on the desktop, the Start menu, and the Quick Launch toolbar. It searches for shortcuts to Chromium-based browsers, such as Google Chrome, Microsoft Edge, Vivaldi, Brave… Having found one, the malware alters its command line by adding an instruction to install a browser extension, which is also embedded in the executable file. Five minutes later, the malicious script terminates the browser process, prompting the user to restart it using one of the modified shortcuts.

ADVERTISEMENT

Malicious browser extension

After the user clicks the shortcut, a malicious extension is installed in the browser, where it convincingly masquerades as Google Docs Offline, using the exact same icon and description (though only in English, which can give away the fake in some regions).

Once installed and running, the malicious extension starts constantly monitoring all tabs opened by the user in the browser and sending information about them to the attackers’ C2 server. If it finds an address associated with Facebook among the opened tabs, the malicious extension checks for Ads and Business accounts and then hijacks them.

The extension steals information from Facebook accounts logged into on the victim’s device, as well as active session cookies stored by the browser, which can be used to sign in to the accounts without authentication.

The group behind the malware has reportedly been active since 2018. Several research teams believe it has Vietnamese origin. The group’s distribution of Ducktail can be pinpointed to 2021.

How to guard against Ducktail

To protect against Ducktail and similar threats, employees need to simply observe basic digital hygiene; in particular:

  • Never download suspicious archives on work computers — especially if the links come from untrusted sources.
  • Carefully check the extensions of all files downloaded from the internet or email before opening them.
  • Never click on a file that looks like a harmless document but has an EXE extension — this is a clear sign of malware.
  • Always install reliable protection on all work devices.This will warn you of potential danger and defeat any attacks in time. Our solutions detect this threat with the verdict HEUR:Trojan.Win64.Ducktail.gen.
  • You can find indicators of compromise as well as more technical details on this malware in the respective Securelist blog post.
Was this article helpful?
YesNo
Tags: malware from the Ducktail family
ADVERTISEMENT
Previous Post

Reptar: a vulnerability in Intel processors

Next Post

What is an app switcher?

RelatedPosts

Best Cybersecurity Solutions for SMBs
Cybersecurity

Best Cybersecurity Solutions for SMBs

5 months ago

Small and mid-sized businesses (SMBs) are no longer flying under the radar when it comes to cyberattacks. In fact, they’ve...

Reptar: a vulnerability in Intel processors
Cybersecurity

Reptar: a vulnerability in Intel processors

2 years ago

On November 14, Google released a bulletin reporting a serious vulnerability in a number of Intel processors — starting from the Ice Lake generation...

What is Anti-Aliasing?
Cybersecurity

What is a compromise assessment service?

2 years ago

A question for many businesses these days isn’t “Will we get hacked?” but rather, “Might we have already been hacked...

Cybersecurity Based on Risk and Enhanced by Managed Detection and Response (MDR)
Cybersecurity

Top Cybersecurity Certifications That Pay Well

5 months ago

Cybersecurity is one of the fastest-growing fields in tech, and demand for certified professionals has never been higher. Companies across...

Top 5 cybersecurity companies in Nepal
Cybersecurity

Top 5 cybersecurity companies in Nepal

2 years ago

Here's a list of the top 5 cybersecurity companies in Nepal, including their focus areas and how they contribute to...

What is Anti-Aliasing?
Cybersecurity

The top-10 mistakes made when configuring enterprise IT systems

2 years ago

Errors in configuring IT infrastructure are a regular occurrence at large organizations — even given the most mature and competent...

Grab Malwarebytes Premium at Half Price—This Week Only!
Cybersecurity

Grab Malwarebytes Premium at Half Price—This Week Only!

2 years ago

If you're on the hunt for robust antivirus software that won't bog down your system, Malwarebytes Premium is a top...

Is AT&T down…or is it just you?
Cybersecurity

Is AT&T down…or is it just you?

2 years ago

AT&T's service isn't perfect, and large-scale outages can occur with its internet, mobile phone, and TV services, leaving you asking,,...

Cyber crimes in Qatar: The law and how to report them
Cybersecurity

Kenyan Govt Websites among Most Targeted as Cybercrime Surges, Over 840M Threats Detected

10 months ago

NAIROBI, Kenya – Kenya’s critical information infrastructure, including government websites, has emerged as a prime target for cybercriminals following a...

Cyber crimes in Qatar: The law and how to report them
Cybersecurity

Cybersecurity Tips for Kakamega Enterprises

6 months ago

In today's digital age, enterprises in Kakamega County face increasing cybersecurity threats that can compromise sensitive data, disrupt operations, and...

Load More
Next Post
What is Anti-Aliasing?

What is an app switcher?

What is Anti-Aliasing?

What is absolute location?

ADVERTISEMENT
Nyongesa Sande

Nyongesa Sande delivers breaking news, technology updates, billionaire profiles, inventions, AI trends, and inspiring facts.

  • About Us
  • Privacy
  • Terms
  • AdChoices
  • Contact Us
  • Careers
  • Dictionary
  • Donate

©2025 Nyongesa Sande. All rights reserved.

No Result
View All Result
  • Tech News
  • Banking
  • Biography
  • Politics
  • Presidents
  • How To
  • Wiki
  • Real Estate
  • Health
  • Gadget Reviews
  • Top 10
  • History
  • Companies
  • Sports
  • Loans
  • Finance
  • Travel
  • Breaking News
  • AI
  • Electric Vehicle
  • Motivation
  • Phone Prices
  • Hosting
  • Shopping Malls
  • Africa
  • Business
  • Insurance
  • Restaurants
  • Investment
  • Classifieds
  • KenyanBaze
  • Shop Anything

©2025 Nyongesa Sande. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.