Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Posted on September 11, 2025September 11, 2025 By CWS

Sep 11, 2025Ravie LakshmananMalvertising / Browser Safety
Cybersecurity researchers have disclosed two new campaigns which can be serving pretend browser extensions utilizing malicious advertisements and pretend web sites to steal delicate knowledge.
The malvertising marketing campaign, per Bitdefender, is designed to push pretend “Meta Verified” browser extensions named SocialMetrics Professional that declare to unlock the blue examine badge for Fb and Instagram profiles. Not less than 37 malicious advertisements have been noticed serving the extension in query.
“The malicious advertisements are bundled with a video tutorial that guides viewers by the method of downloading and putting in a so-called browser extension, which claims to unlock the blue verification tick on Fb or different particular options,” the Romanian cybersecurity vendor mentioned.
However, in actuality, the extension – which is hosted on a reputable cloud service known as Field — is able to amassing session cookies from Fb and sending them to a Telegram bot managed by the attackers. It is also geared up to acquire the sufferer’s IP handle by sending a question to ipinfo[.]io/json.
Choose variants of the rogue browser add-on have been noticed utilizing the stolen cookies to work together with the Fb Graph API to possible fetch extra info associated to the accounts. Prior to now, malware like NodeStealer has leveraged the Fb Graph API to gather finances particulars of the account.
The tip purpose of those efforts is to promote worthwhile Fb Enterprise and Adverts accounts on underground boards for revenue to different fraudsters, or repurpose them to gasoline extra malvertising campaigns, which, in flip, results in extra hijacked accounts – successfully making a self-perpetuating cycle.

The marketing campaign displays all of the “fingerprints” sometimes related to Vietnamese-speaking menace actors, who’re identified to undertake numerous stealer households to focus on and acquire unauthorized entry to Fb accounts. This speculation can be bolstered by means of Vietnamese to relate the tutorial and add supply code feedback.

“By utilizing a trusted platform, attackers can mass-generate hyperlinks, mechanically embed them into tutorials, and constantly refresh their campaigns,” Bitdefender mentioned. “This suits a bigger sample of attackers industrializing malvertising, the place all the pieces from advert pictures to tutorials is created en masse.”
The disclosure with one other marketing campaign that is concentrating on Meta advertisers with rogue Chrome extensions distributed through counterfeit web sites posing as synthetic intelligence (AI)-powered advert optimization instruments for Fb and Instagram. On the coronary heart of the operation is a pretend platform named Madgicx Plus.
“Promoted as a software to streamline marketing campaign administration and enhance ROI utilizing synthetic intelligence, the extension as an alternative delivers probably malicious functionalities able to hijacking enterprise periods, stealing credentials, and compromising Meta Enterprise accounts,” Cybereason mentioned.
“The extensions are promoted as productiveness or advert efficiency enhancers, however they function as dual-purpose malware able to stealing credentials, accessing session tokens, or enabling account takeover.
The extensions, the primary of which remains to be obtainable for obtain from the Chrome Internet Retailer as of writing, are listed beneath –

As soon as put in, the extension good points full entry to all web sites the person visits, enabling the menace actors to inject arbitrary scripts, in addition to intercept and modify community site visitors, monitor searching exercise, seize type inputs, and harvest delicate knowledge.
It additionally prompts customers to hyperlink their Fb and Google accounts to entry the service, whereas their id info is covertly harvested within the background. Moreover, the add-ons operate equally to the aforementioned pretend Meta Verified extension in that it makes use of victims’ stolen Fb credentials to work together with the Fb Graph API.
“This staged method reveals a transparent threat-actor technique: first capturing Google id knowledge, then pivoting to Fb to broaden entry and improve the probabilities of hijacking worthwhile enterprise or promoting belongings,” Cybereason mentioned.

The Hacker News Tags:Accounts, Business, Extensions, Fake, Hijacking, Madgicx, Meta, SocialMetrics

Post navigation

Previous Post: Helping CISOs Speak the Language of Business
Next Post: NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges

Related Posts

Chaos RaaS Emerges After BlackSuit Takedown, Demanding 0K from U.S. Victims Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims The Hacker News
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses The Hacker News
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw The Hacker News
New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module The Hacker News
NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More The Hacker News
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News