Vietnamese Hackers Linked to 'Malverposting' Campaign

Cyber Security Threat Summary:
According to a recent blog post by Guardio Labs, a Vietnamese threat actor is conducting a malverposting campaign, which has been ongoing for several months. It's estimated that this campaign has infected more than 500,000 devices worldwide within the last three months alone. Malverposting is the act of using social media posts and tweets to spread malicious software and other security threats. In this instance, the attacker abused Facebook's Ad service to distribute malware. Guardio Labs' head of cyber security, Nati Tal, stated that the high number of infections was made possible by using Facebook's Ad service as the initial delivery mechanism.

“The Guardio team observed that the Vietnamese campaign relied on malverposting while it evolved various evasion techniques. It particularly focused on the USA, Canada, England and Australia. “This threat actor is creating new business profiles, as well as hijacking real, reputable profiles with even millions of followers,” Tal explained. They also repeatedly posted malicious clickbait on Facebook feeds promising adult-rated photo album downloads for free. “Once victims click on those posts/links, a malicious ZIP file is downloaded to their computers,” reads the advisory. “Inside are photo files (that are actually masqueraded executable files) that, when clicked, will initiate the infection process.” The executable then opens a browser window popup with a decoy website showing related content. “While in the background, the stealer will silently deploy, execute and gain persistence to periodically exfiltrate your sessions cookies, accounts, crypto-wallets and more.” Tal clarified that the team observed several variations of the latest payload, yet all shared a benign executable file to start the infection flow” (InfoSecurity Magazine, 2023).

Security Officer Comments:
The campaign has targeted the Facebook accounts of business owners, and when compromised the attacker takes control of the account to exploit the business's reputation. The attacker then follows the advertisement account, which sometimes still holds funds. By assuming the identity of the business, the attacker spreads more harmful ads through the account, resulting in a wider impact. This harms new users and disrupts the legitimate business activities of reputable brands and stores. Researchers explain that the malicious payload used in the malvertising campaign is highly advanced and constantly changing, with the introduction of new evasive techniques. This makes it challenging for security vendors to detect and block the malware, especially when it is used out of context. Guardio Labs' warning was issued after Group-IB reported a phishing scam targeting Facebook users, as well.

Suggested Corrections:
Guardio Labs has published IOCs associated with the campaign including domains, malicious payload files, and affected Facebook pages/profiles.

Additionally, these other best practices should be followed:

  • Do not open emails or download software from untrusted sources
  • Do not click on links or attachments in emails that come from unknown senders
  • Do not supply passwords, personal, or financial information via email to anyone (sensitive information is also used for double extortion)
  • Always verify the email sender's email address, name, and domain
  • Backup important files frequently and store them separately from the main system
  • Protect devices using antivirus, anti-spam and anti-spyware software
  • Report phishing emails to the appropriate security or I.T. staff immediately

    Link:
    https://www.infosecurity-magazine.com/news/vietnamese-hackers-malverposting/
    https://labs.guard.io/