Jump to content

Recommended Posts

  • ExTS Admin
Posted

StressPaint malware is "developed professionally" and could be be harvesting accounts for anything from credential selling and identity theft, to malvertising and propaganda campaigns, warn researchers.

 

Q24P9Wh.jpg

 

Users who download a painting software advertised as a tool for stress relief might soon find themselves stressed out because the program is actually a front for malware which steals their Facebook credentials and payment information.

 

'StressPaint' first appeared a few days ago and at the time of writing has infected over 45,000 Facebook users.

The attacks appear to specifically target users who operate Facebook pages and have configured a payment method into the account.

 

Uncovered by Radware, the malware has quickly spread around the world with a high infection rate, indicating what researchers say "indicates this malware was developed professionally".

 

It's also suggested that the attackers could go after Amazon users in a future campaign, given it has a dedicated section in a control panel used in the campaign which has been analysed by researchers.

 

An infection campaign is carried out via phishing emails and users are socially engineered to believe they're visiting a real website - AOL is used as a hook in many of the attacks.

However, the website they're being driven to is in fact a front for the malicious activity.

 

The site promotes software called 'Relieve Stress Paint' and urges the user to download it for free.

If they do download and run the file, a window opens to show a basic painting program to the user, to give the impression that nothing suspicious happening while the malware runs in the background.

 

SuNzgfS.png

 

However, once 'Relieve Stress Paint' is launched, the malware immediately runs and drops files onto the system and it will look to steal information from that moment - then subsequently each time the computer is restarted.

 

StressPaint steals information by copying the content of Chrome browser cookies and login date files.

If saved Facebook credentials are found, they're sent to a C2 server.

 

Once the stolen credentials are validated, additional information is collected on the compromised account, including the number of friends, whether the account manages a page or not, or if a payment method is connected to the account.

 

"Security tools, like anti-virus or endpoint detection and response, always look for suspicious active processes on the system and general credential stealing methods like key logging or hooking," Adi Raff, security research team leader at Radware told ZDNet.

 

"We believe that the process of the malware is only active on the system for less than a minute on specific occasions (like first run, computer restart and stress pain tool rerun) and that the data theft is done from a copy of Chrome files (cookies/login data) which helps the malware stay undetected".

 

Currently, the attacks only appear to be collecting data, but researchers suggest the stolen information could be used for profit in a number of ways.

They include selling the credentials on underground forums, extorting victims by threatening to reveal personal information, espionage, profit from stolen payment information and identity theft.

 

However, it's suggested the fact the attackers are looking for accounts with pages and users with large amounts of friends means those behind the campaign - who've not been identified - are playing a long game.

 

"With the stolen credentials, access to web pages and payment details, the group can launch malicious advertisement campaigns, whether to make profit or spread more malwares.

They can use small amounts from each user without raising suspicion and collect a critical mass to launch any activity," warn researchers, who say the same applies to propaganda.

 

"With the same information, instead of advertising a product or a service, they can run a campaign to promote their agenda and reveal people/personal identities."

 

Radware has disclosed the research to Facebook. "We are investigating these malware findings and we are taking steps to help protect and notify those who are impacted," Pete Voss, Facebook communications manager told ZDNet.

 

In order to avoid falling victim to a StressPaint attack, Radware urges users to be careful what they click.

 

"To stay protected, people need to make sure that they are downloading applications from legitimate sites and always double check the site in the browser before downloading," said Raff.

 

 

Source:

This malware targets Facebook log-in details, infects over 45,000 in just days | ZDNet

Member of:

UNITE

  • Replies 2
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

Posted Images

  • ExTS Admin
Posted
A few of my friends have been hit by this.

Need computer support? Then why not join Free PC Help. Register here

We are members helping other members.

Please return here where you may be able to help someone else.

After all, no one knows everything and you may have the answer that someone needs.

  • 2 weeks later...
Posted
I'm at the stage now where I avoid Facebook most of the time

[Windows 7, Windows 8.1, Ubuntu MATE, Linux Mint, Chromebook]

 

[several Raspberry Pi running various versions of Raspbian]

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...