Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords

Posted on June 30, 2025June 30, 2025 By CWS

Cybercriminals have launched a classy marketing campaign exploiting Fb’s promoting platform to distribute malware and steal cryptocurrency pockets credentials, focusing on customers worldwide by means of misleading Pi Community-themed commercials.

The malicious operation, which started on June 24, 2025, coincides with the Pi2Day celebration and has already deployed over 140 advert variations to maximise its attain throughout a number of continents.

The assault marketing campaign demonstrates a coordinated effort by risk actors who’ve weaponized official social media promoting mechanisms to ship multi-stage malware payloads.

These malicious commercials masquerade as official Pi Community promotions, providing pretend mining purposes and fraudulent pockets entry portals that promise customers substantial cryptocurrency rewards.

The marketing campaign’s international scope encompasses america, Europe, Australia, China, Vietnam, India, and the Philippines, indicating a well-resourced operation with worldwide ambitions.

The risk actors make use of two main assault vectors to compromise victims. The primary includes phishing pages that meticulously mimic official Pi Pockets interfaces, prompting customers to enter their 24-word restoration phrases underneath the pretense of claiming 628 Pi tokens or taking part in unique airdrop occasions.

Phishing web page (Supply – Bitdefender)

As soon as entered, these credentials grant attackers full management over victims’ cryptocurrency wallets, enabling instant fund transfers.

Bitdefender researchers recognized the second assault vector as malware-embedded purposes disguised as Pi Community mining software program.

These misleading installers promise customers bonuses of 31.4 Pi tokens for downloading and executing PC purposes.

Nevertheless, the software program packages comprise malicious payloads recognized as Generic.MSIL.WMITask and Generic.JS.WMITask variants, representing multi-stage malware beforehand analyzed by Bitdefender’s safety staff in Might 2025.

Multi-Stage Malware An infection Mechanism

The malware’s an infection course of demonstrates subtle engineering designed to evade detection whereas sustaining persistence on compromised programs.

Upon preliminary execution, the malicious payload establishes a foothold by means of obfuscation methods that bypass conventional antivirus options and sandbox environments.

The malware’s structure incorporates a number of phases, with every element serving particular capabilities within the general assault chain.

The first payload focuses on credential harvesting, systematically extracting saved passwords, authentication tokens, and cryptocurrency pockets keys from contaminated programs.

Concurrently, the malware deploys keylogging capabilities to seize real-time consumer enter, together with newly entered passwords, restoration phrases, and delicate monetary info.

The malware’s persistence mechanisms guarantee continued operation even after system reboots, whereas its communication modules set up connections with command-and-control infrastructure to exfiltrate stolen knowledge and obtain extra malicious parts.

The marketing campaign’s success stems from exploiting customers’ belief in verified social media platforms and their restricted understanding of cryptocurrency safety practices.

By leveraging Fb’s promoting legitimacy and Pi Community’s rising recognition, risk actors have created an efficient distribution mechanism that continues to evolve and adapt to safety countermeasures.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Actors, Ads, Deliver, Facebook, Malware, Passwords, Stealing, Threat, Wallet, Weaponizing

Post navigation

Previous Post: Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules
Next Post: Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Related Posts

Endpoint Security Reimagined EDR vs XDR Comparison Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News
Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens Cyber Security News
How to Conduct a Secure Code Review Cyber Security News
New Vulnerability Affects All Intel Processors From The Last 6 Years Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News