New Phishing Attack Via Facebook Messenger
In an alarming development, a new phishing attack is surfacing via Facebook Messenger. This attack utilizes messages with malicious attachments originating from a swarm of fake and hijacked personal accounts. The ultimate goal of these attacks is to take over the targets’ accounts. This campaign is yet another one linked to a Vietnamese-based group. Learn more about phishing attacks here.
Dangerous Attachments and The Stealer
The campaign is uniquely characterized by its use of a tiny compressed file attachment. This attachment, however, is not as innocent as it seems. It contains a powerful Python-based stealer. This stealer is dropped in a multi-stage process designed to take over the targets’ accounts. For Cyber Security Professionals, understanding and combating these stealthy attachments is critical.
Understanding The Multi-Stage Process
- Stage one involves sending the initial message with the malicious attachment.
- The second stage involves the Python-based stealer being dropped into the targeted system.
- The third and final stage is the takeover of the targets’ accounts.
These stages demonstrate the sophistication and complexity of the phishing campaign. Learn more about Cyber Incident Response here.
FAQ’s
Question | Answer |
---|---|
What is the new phishing attack about? | The new phishing attack uses Facebook Messenger to send messages with malicious attachments from fake and hijacked personal accounts. |
How does the attack work? | The attack uses a multi-stage process involving a Python-based stealer dropped into the targeted system. |
Conclusion
In conclusion, this new phishing attack is a potent reminder of the ever-evolving and complex nature of cyber threats. It underscores the importance of maintaining robust and proactive cyber defenses and being cyber aware, particularly for large organisations and the public sector who often become the primary targets for such attacks.
Leave a Reply