Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords

Posted on June 30, 2025June 30, 2025 By CWS

Cybercriminals have launched a classy marketing campaign exploiting Fb’s promoting platform to distribute malware and steal cryptocurrency pockets credentials, focusing on customers worldwide by means of misleading Pi Community-themed commercials.

The malicious operation, which started on June 24, 2025, coincides with the Pi2Day celebration and has already deployed over 140 advert variations to maximise its attain throughout a number of continents.

The assault marketing campaign demonstrates a coordinated effort by risk actors who’ve weaponized official social media promoting mechanisms to ship multi-stage malware payloads.

These malicious commercials masquerade as official Pi Community promotions, providing pretend mining purposes and fraudulent pockets entry portals that promise customers substantial cryptocurrency rewards.

The marketing campaign’s international scope encompasses america, Europe, Australia, China, Vietnam, India, and the Philippines, indicating a well-resourced operation with worldwide ambitions.

The risk actors make use of two main assault vectors to compromise victims. The primary includes phishing pages that meticulously mimic official Pi Pockets interfaces, prompting customers to enter their 24-word restoration phrases underneath the pretense of claiming 628 Pi tokens or taking part in unique airdrop occasions.

Phishing web page (Supply – Bitdefender)

As soon as entered, these credentials grant attackers full management over victims’ cryptocurrency wallets, enabling instant fund transfers.

Bitdefender researchers recognized the second assault vector as malware-embedded purposes disguised as Pi Community mining software program.

These misleading installers promise customers bonuses of 31.4 Pi tokens for downloading and executing PC purposes.

Nevertheless, the software program packages comprise malicious payloads recognized as Generic.MSIL.WMITask and Generic.JS.WMITask variants, representing multi-stage malware beforehand analyzed by Bitdefender’s safety staff in Might 2025.

Multi-Stage Malware An infection Mechanism

The malware’s an infection course of demonstrates subtle engineering designed to evade detection whereas sustaining persistence on compromised programs.

Upon preliminary execution, the malicious payload establishes a foothold by means of obfuscation methods that bypass conventional antivirus options and sandbox environments.

The malware’s structure incorporates a number of phases, with every element serving particular capabilities within the general assault chain.

The first payload focuses on credential harvesting, systematically extracting saved passwords, authentication tokens, and cryptocurrency pockets keys from contaminated programs.

Concurrently, the malware deploys keylogging capabilities to seize real-time consumer enter, together with newly entered passwords, restoration phrases, and delicate monetary info.

The malware’s persistence mechanisms guarantee continued operation even after system reboots, whereas its communication modules set up connections with command-and-control infrastructure to exfiltrate stolen knowledge and obtain extra malicious parts.

The marketing campaign’s success stems from exploiting customers’ belief in verified social media platforms and their restricted understanding of cryptocurrency safety practices.

By leveraging Fb’s promoting legitimacy and Pi Community’s rising recognition, risk actors have created an efficient distribution mechanism that continues to evolve and adapt to safety countermeasures.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Actors, Ads, Deliver, Facebook, Malware, Passwords, Stealing, Threat, Wallet, Weaponizing

Post navigation

Previous Post: Germany Urges Apple, Google to Block Chinese AI App DeepSeek Over Privacy Rules
Next Post: Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks

Related Posts

List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News
Google Chrome 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News
Sophisticated NPM Attack Exploits Google Calendar C2 For Sophisticated Communication Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Role of Threat Intelligence in Proactive Defense Strategies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark